nss →
2:3.26-1+debu7u4 →
armhf → 2017-06-01 02:01:51
sbuild (Debian sbuild) 0.71.0 (24 Aug 2016) on testwandboard
+==============================================================================+
| nss 2:3.26-1+debu7u4 (armhf) Wed, 31 May 2017 22:16:32 +0000 |
+==============================================================================+
Package: nss
Version: 2:3.26-1+debu7u4
Source Version: 2:3.26-1+debu7u4
Distribution: wheezy-staging
Machine Architecture: armhf
Host Architecture: armhf
Build Architecture: armhf
I: NOTICE: Log filtering will replace 'var/lib/schroot/mount/wheezy-staging-armhf-sbuild-f94001d0-c346-441d-87a3-887be1052123' with '<<CHROOT>>'
+------------------------------------------------------------------------------+
| Update chroot |
+------------------------------------------------------------------------------+
Get:1 http://172.17.0.1 wheezy-staging Release.gpg [473 B]
Get:2 http://172.17.0.1 wheezy-staging Release [10.8 kB]
Get:3 http://172.17.0.1 wheezy-staging/main Sources [6093 kB]
Get:4 http://172.17.0.1 wheezy-staging/main armhf Packages [7677 kB]
Fetched 13.8 MB in 22s (607 kB/s)
Reading package lists...
+------------------------------------------------------------------------------+
| Fetch source files |
+------------------------------------------------------------------------------+
Check APT
---------
Checking available source versions...
Download source files with APT
------------------------------
Reading package lists...
Building dependency tree...
NOTICE: 'nss' packaging is maintained in the 'Git' version control system at:
https://anonscm.debian.org/git/pkg-mozilla/nss.git
Need to get 7431 kB of source archives.
Get:1 http://172.17.0.1/private/ wheezy-staging/main nss 2:3.26-1+debu7u4 (dsc) [2232 B]
Get:2 http://172.17.0.1/private/ wheezy-staging/main nss 2:3.26-1+debu7u4 (tar) [7387 kB]
Get:3 http://172.17.0.1/private/ wheezy-staging/main nss 2:3.26-1+debu7u4 (diff) [42.2 kB]
Fetched 7431 kB in 2s (2675 kB/s)
Download complete and in download only mode
I: NOTICE: Log filtering will replace 'build/nss-8PyjWJ/nss-3.26' with '<<PKGBUILDDIR>>'
I: NOTICE: Log filtering will replace 'build/nss-8PyjWJ' with '<<BUILDDIR>>'
+------------------------------------------------------------------------------+
| Install build-essential |
+------------------------------------------------------------------------------+
Setup apt archive
-----------------
Merged Build-Depends: build-essential, fakeroot
Filtered Build-Depends: build-essential, fakeroot
dpkg-deb: building package `sbuild-build-depends-core-dummy' in `/<<BUILDDIR>>/resolver-moPG1z/apt_archive/sbuild-build-depends-core-dummy.deb'.
dpkg-scanpackages: warning: Packages in archive but missing from override file:
dpkg-scanpackages: warning: sbuild-build-depends-core-dummy
dpkg-scanpackages: info: Wrote 1 entries to output Packages file.
gpg: keyring `/<<BUILDDIR>>/resolver-moPG1z/gpg/secring.gpg' created
gpg: keyring `/<<BUILDDIR>>/resolver-moPG1z/gpg/pubring.gpg' created
gpg: /<<BUILDDIR>>/resolver-moPG1z/gpg/trustdb.gpg: trustdb created
gpg: key 48F77B2E: public key "Sbuild Signer (Sbuild Build Dependency Archive Key) <buildd-tools-devel@lists.alioth.debian.org>" imported
gpg: Total number processed: 1
gpg: imported: 1 (RSA: 1)
gpg: key 48F77B2E: secret key imported
gpg: key 48F77B2E: "Sbuild Signer (Sbuild Build Dependency Archive Key) <buildd-tools-devel@lists.alioth.debian.org>" not changed
gpg: Total number processed: 1
gpg: unchanged: 1
gpg: secret keys read: 1
gpg: secret keys imported: 1
Get:1 copy: ./ Release.gpg [316 B]
Get:2 copy: ./ Release [957 B]
Get:3 copy: ./ Sources [350 B]
Get:4 copy: ./ Packages [430 B]
Fetched 2053 B in 0s (22.9 kB/s)
Reading package lists...
Reading package lists...
Install core build dependencies (apt-based resolver)
----------------------------------------------------
Installing build dependencies
Reading package lists...
Building dependency tree...
The following NEW packages will be installed:
sbuild-build-depends-core-dummy
0 upgraded, 1 newly installed, 0 to remove and 19 not upgraded.
Need to get 704 B of archives.
After this operation, 0 B of additional disk space will be used.
Get:1 copy:/<<BUILDDIR>>/resolver-moPG1z/apt_archive/ ./ sbuild-build-depends-core-dummy 0.invalid.0 [704 B]
debconf: delaying package configuration, since apt-utils is not installed
Fetched 704 B in 0s (0 B/s)
Selecting previously unselected package sbuild-build-depends-core-dummy.
(Reading database ... 11317 files and directories currently installed.)
Unpacking sbuild-build-depends-core-dummy (from .../sbuild-build-depends-core-dummy_0.invalid.0_armhf.deb) ...
Setting up sbuild-build-depends-core-dummy (0.invalid.0) ...
+------------------------------------------------------------------------------+
| Check architectures |
+------------------------------------------------------------------------------+
Arch check ok (armhf included in any)
+------------------------------------------------------------------------------+
| Install package build dependencies |
+------------------------------------------------------------------------------+
Setup apt archive
-----------------
Merged Build-Depends: debhelper (>= 9), dpkg-dev (>= 1.16.1.1~), libnspr4-dev (>= 2:4.12), zlib1g-dev, libsqlite3-dev (>= 3.3.9), gcc-4.7, g++-4.7
Filtered Build-Depends: debhelper (>= 9), dpkg-dev (>= 1.16.1.1~), libnspr4-dev (>= 2:4.12), zlib1g-dev, libsqlite3-dev (>= 3.3.9), gcc-4.7, g++-4.7
dpkg-deb: building package `sbuild-build-depends-nss-dummy' in `/<<BUILDDIR>>/resolver-moPG1z/apt_archive/sbuild-build-depends-nss-dummy.deb'.
dpkg-scanpackages: warning: Packages in archive but missing from override file:
dpkg-scanpackages: warning: sbuild-build-depends-core-dummy sbuild-build-depends-nss-dummy
dpkg-scanpackages: info: Wrote 2 entries to output Packages file.
Get:1 copy: ./ Release.gpg [316 B]
Get:2 copy: ./ Release [963 B]
Get:3 copy: ./ Sources [543 B]
Get:4 copy: ./ Packages [625 B]
Fetched 2447 B in 0s (26.4 kB/s)
Reading package lists...
Reading package lists...
Install nss build dependencies (apt-based resolver)
---------------------------------------------------
Installing build dependencies
Reading package lists...
Building dependency tree...
Reading state information...
The following extra packages will be installed:
bsdmainutils cpp-4.7 debhelper file g++-4.7 gcc-4.7 gettext gettext-base
groff-base html2text intltool-debian libasprintf0c2 libcroco3 libffi5
libgettextpo0 libglib2.0-0 libmagic1 libnspr4 libnspr4-dev libpcre3
libpipeline1 libsqlite3-0 libsqlite3-dev libstdc++6-4.7-dev libunistring0
libxml2 man-db po-debconf zlib1g-dev
Suggested packages:
wamerican wordlist whois vacation gcc-4.7-locales dh-make gcc-4.7-doc
libstdc++6-4.7-dbg libmudflap0-4.7-dev libgcc1-dbg libgomp1-dbg libitm1-dbg
libquadmath-dbg libmudflap0-dbg libcloog-ppl0 libppl-c2 libppl7
binutils-gold gettext-doc groff sqlite3-doc libstdc++6-4.7-doc less
www-browser libmail-box-perl
Recommended packages:
curl wget lynx-cur autopoint libglib2.0-data shared-mime-info xml-core
libmail-sendmail-perl
The following NEW packages will be installed:
bsdmainutils cpp-4.7 debhelper file g++-4.7 gcc-4.7 gettext gettext-base
groff-base html2text intltool-debian libasprintf0c2 libcroco3 libffi5
libgettextpo0 libglib2.0-0 libmagic1 libnspr4 libnspr4-dev libpcre3
libpipeline1 libsqlite3-0 libsqlite3-dev libstdc++6-4.7-dev libunistring0
libxml2 man-db po-debconf sbuild-build-depends-nss-dummy zlib1g-dev
0 upgraded, 30 newly installed, 0 to remove and 19 not upgraded.
Need to get 27.7 MB of archives.
After this operation, 74.2 MB of additional disk space will be used.
Get:1 copy:/<<BUILDDIR>>/resolver-moPG1z/apt_archive/ ./ sbuild-build-depends-nss-dummy 0.invalid.0 [764 B]
Get:2 http://172.17.0.1/private/ wheezy-staging/main libpcre3 armhf 1:8.30-5 [242 kB]
Get:3 http://172.17.0.1/private/ wheezy-staging/main libpipeline1 armhf 1.2.1-1 [35.0 kB]
Get:4 http://172.17.0.1/private/ wheezy-staging/main libasprintf0c2 armhf 0.18.1.1-9 [26.4 kB]
Get:5 http://172.17.0.1/private/ wheezy-staging/main libmagic1 armhf 5.11-2+deb7u9 [201 kB]
Get:6 http://172.17.0.1/private/ wheezy-staging/main libsqlite3-0 armhf 3.7.13-1+deb7u3 [414 kB]
Get:7 http://172.17.0.1/private/ wheezy-staging/main libxml2 armhf 2.8.0+dfsg1-7+wheezy7 [826 kB]
Get:8 http://172.17.0.1/private/ wheezy-staging/main libffi5 armhf 3.0.10-3+b3 [22.9 kB]
Get:9 http://172.17.0.1/private/ wheezy-staging/main libglib2.0-0 armhf 2.33.12+really2.32.4-5 [1689 kB]
Get:10 http://172.17.0.1/private/ wheezy-staging/main libcroco3 armhf 0.6.6-2+deb7u1 [119 kB]
Get:11 http://172.17.0.1/private/ wheezy-staging/main libunistring0 armhf 0.9.3-5 [408 kB]
Get:12 http://172.17.0.1/private/ wheezy-staging/main libgettextpo0 armhf 0.18.1.1-9 [130 kB]
Get:13 http://172.17.0.1/private/ wheezy-staging/main libnspr4 armhf 2:4.12-1+deb7u1 [118 kB]
Get:14 http://172.17.0.1/private/ wheezy-staging/main bsdmainutils armhf 9.0.3 [207 kB]
Get:15 http://172.17.0.1/private/ wheezy-staging/main groff-base armhf 1.21-9 [1071 kB]
Get:16 http://172.17.0.1/private/ wheezy-staging/main man-db armhf 2.6.2-1 [1027 kB]
Get:17 http://172.17.0.1/private/ wheezy-staging/main file armhf 5.11-2+deb7u9 [53.2 kB]
Get:18 http://172.17.0.1/private/ wheezy-staging/main gettext-base armhf 0.18.1.1-9 [138 kB]
Get:19 http://172.17.0.1/private/ wheezy-staging/main cpp-4.7 armhf 4.7.2-5+rpi1 [4762 kB]
Get:20 http://172.17.0.1/private/ wheezy-staging/main html2text armhf 1.3.2a-15 [98.5 kB]
Get:21 http://172.17.0.1/private/ wheezy-staging/main gettext armhf 0.18.1.1-9 [1879 kB]
Get:22 http://172.17.0.1/private/ wheezy-staging/main intltool-debian all 0.35.0+20060710.1 [29.8 kB]
Get:23 http://172.17.0.1/private/ wheezy-staging/main po-debconf all 1.0.16+nmu2 [223 kB]
Get:24 http://172.17.0.1/private/ wheezy-staging/main debhelper all 9.20120909 [705 kB]
Get:25 http://172.17.0.1/private/ wheezy-staging/main gcc-4.7 armhf 4.7.2-5+rpi1 [5327 kB]
Get:26 http://172.17.0.1/private/ wheezy-staging/main libstdc++6-4.7-dev armhf 4.7.2-5+rpi1 [1750 kB]
Get:27 http://172.17.0.1/private/ wheezy-staging/main g++-4.7 armhf 4.7.2-5+rpi1 [5166 kB]
Get:28 http://172.17.0.1/private/ wheezy-staging/main libnspr4-dev armhf 2:4.12-1+deb7u1 [254 kB]
Get:29 http://172.17.0.1/private/ wheezy-staging/main libsqlite3-dev armhf 3.7.13-1+deb7u3 [537 kB]
Get:30 http://172.17.0.1/private/ wheezy-staging/main zlib1g-dev armhf 1:1.2.7.dfsg-13 [212 kB]
debconf: delaying package configuration, since apt-utils is not installed
Fetched 27.7 MB in 13s (2112 kB/s)
Selecting previously unselected package libpcre3:armhf.
(Reading database ... 11317 files and directories currently installed.)
Unpacking libpcre3:armhf (from .../libpcre3_1%3a8.30-5_armhf.deb) ...
Selecting previously unselected package libpipeline1:armhf.
Unpacking libpipeline1:armhf (from .../libpipeline1_1.2.1-1_armhf.deb) ...
Selecting previously unselected package libasprintf0c2:armhf.
Unpacking libasprintf0c2:armhf (from .../libasprintf0c2_0.18.1.1-9_armhf.deb) ...
Selecting previously unselected package libmagic1:armhf.
Unpacking libmagic1:armhf (from .../libmagic1_5.11-2+deb7u9_armhf.deb) ...
Selecting previously unselected package libsqlite3-0:armhf.
Unpacking libsqlite3-0:armhf (from .../libsqlite3-0_3.7.13-1+deb7u3_armhf.deb) ...
Selecting previously unselected package libxml2:armhf.
Unpacking libxml2:armhf (from .../libxml2_2.8.0+dfsg1-7+wheezy7_armhf.deb) ...
Selecting previously unselected package libffi5:armhf.
Unpacking libffi5:armhf (from .../libffi5_3.0.10-3+b3_armhf.deb) ...
Selecting previously unselected package libglib2.0-0:armhf.
Unpacking libglib2.0-0:armhf (from .../libglib2.0-0_2.33.12+really2.32.4-5_armhf.deb) ...
Selecting previously unselected package libcroco3:armhf.
Unpacking libcroco3:armhf (from .../libcroco3_0.6.6-2+deb7u1_armhf.deb) ...
Selecting previously unselected package libunistring0:armhf.
Unpacking libunistring0:armhf (from .../libunistring0_0.9.3-5_armhf.deb) ...
Selecting previously unselected package libgettextpo0:armhf.
Unpacking libgettextpo0:armhf (from .../libgettextpo0_0.18.1.1-9_armhf.deb) ...
Selecting previously unselected package libnspr4:armhf.
Unpacking libnspr4:armhf (from .../libnspr4_2%3a4.12-1+deb7u1_armhf.deb) ...
Selecting previously unselected package bsdmainutils.
Unpacking bsdmainutils (from .../bsdmainutils_9.0.3_armhf.deb) ...
Selecting previously unselected package groff-base.
Unpacking groff-base (from .../groff-base_1.21-9_armhf.deb) ...
Selecting previously unselected package man-db.
Unpacking man-db (from .../man-db_2.6.2-1_armhf.deb) ...
Selecting previously unselected package file.
Unpacking file (from .../file_5.11-2+deb7u9_armhf.deb) ...
Selecting previously unselected package gettext-base.
Unpacking gettext-base (from .../gettext-base_0.18.1.1-9_armhf.deb) ...
Selecting previously unselected package cpp-4.7.
Unpacking cpp-4.7 (from .../cpp-4.7_4.7.2-5+rpi1_armhf.deb) ...
Selecting previously unselected package html2text.
Unpacking html2text (from .../html2text_1.3.2a-15_armhf.deb) ...
Selecting previously unselected package gettext.
Unpacking gettext (from .../gettext_0.18.1.1-9_armhf.deb) ...
Selecting previously unselected package intltool-debian.
Unpacking intltool-debian (from .../intltool-debian_0.35.0+20060710.1_all.deb) ...
Selecting previously unselected package po-debconf.
Unpacking po-debconf (from .../po-debconf_1.0.16+nmu2_all.deb) ...
Selecting previously unselected package debhelper.
Unpacking debhelper (from .../debhelper_9.20120909_all.deb) ...
Selecting previously unselected package gcc-4.7.
Unpacking gcc-4.7 (from .../gcc-4.7_4.7.2-5+rpi1_armhf.deb) ...
Selecting previously unselected package libstdc++6-4.7-dev.
Unpacking libstdc++6-4.7-dev (from .../libstdc++6-4.7-dev_4.7.2-5+rpi1_armhf.deb) ...
Selecting previously unselected package g++-4.7.
Unpacking g++-4.7 (from .../g++-4.7_4.7.2-5+rpi1_armhf.deb) ...
Selecting previously unselected package libnspr4-dev.
Unpacking libnspr4-dev (from .../libnspr4-dev_2%3a4.12-1+deb7u1_armhf.deb) ...
Selecting previously unselected package libsqlite3-dev.
Unpacking libsqlite3-dev (from .../libsqlite3-dev_3.7.13-1+deb7u3_armhf.deb) ...
Selecting previously unselected package zlib1g-dev:armhf.
Unpacking zlib1g-dev:armhf (from .../zlib1g-dev_1%3a1.2.7.dfsg-13_armhf.deb) ...
Selecting previously unselected package sbuild-build-depends-nss-dummy.
Unpacking sbuild-build-depends-nss-dummy (from .../sbuild-build-depends-nss-dummy_0.invalid.0_armhf.deb) ...
Setting up libpcre3:armhf (1:8.30-5) ...
Setting up libpipeline1:armhf (1.2.1-1) ...
Setting up libasprintf0c2:armhf (0.18.1.1-9) ...
Setting up libmagic1:armhf (5.11-2+deb7u9) ...
Setting up libsqlite3-0:armhf (3.7.13-1+deb7u3) ...
Setting up libxml2:armhf (2.8.0+dfsg1-7+wheezy7) ...
Setting up libffi5:armhf (3.0.10-3+b3) ...
Setting up libglib2.0-0:armhf (2.33.12+really2.32.4-5) ...
No schema files found: doing nothing.
Setting up libcroco3:armhf (0.6.6-2+deb7u1) ...
Setting up libunistring0:armhf (0.9.3-5) ...
Setting up libgettextpo0:armhf (0.18.1.1-9) ...
Setting up libnspr4:armhf (2:4.12-1+deb7u1) ...
Setting up bsdmainutils (9.0.3) ...
update-alternatives: using /usr/bin/bsd-write to provide /usr/bin/write (write) in auto mode
update-alternatives: using /usr/bin/bsd-from to provide /usr/bin/from (from) in auto mode
Setting up groff-base (1.21-9) ...
Setting up man-db (2.6.2-1) ...
Building database of manual pages ...
Setting up file (5.11-2+deb7u9) ...
Setting up gettext-base (0.18.1.1-9) ...
Setting up cpp-4.7 (4.7.2-5+rpi1) ...
Setting up html2text (1.3.2a-15) ...
Setting up gettext (0.18.1.1-9) ...
Setting up intltool-debian (0.35.0+20060710.1) ...
Setting up po-debconf (1.0.16+nmu2) ...
Setting up debhelper (9.20120909) ...
Setting up gcc-4.7 (4.7.2-5+rpi1) ...
Setting up libnspr4-dev (2:4.12-1+deb7u1) ...
Setting up libsqlite3-dev (3.7.13-1+deb7u3) ...
Setting up zlib1g-dev:armhf (1:1.2.7.dfsg-13) ...
Setting up g++-4.7 (4.7.2-5+rpi1) ...
Setting up sbuild-build-depends-nss-dummy (0.invalid.0) ...
Setting up libstdc++6-4.7-dev (4.7.2-5+rpi1) ...
+------------------------------------------------------------------------------+
| Build environment |
+------------------------------------------------------------------------------+
Kernel: Linux 4.8.0-0.bpo.2-armmp armhf (armv7l)
Toolchain package versions: binutils_2.22-8+deb7u2 dpkg-dev_1.16.16+rpi1 g++-4.6_4.6.3-14+rpi1 g++-4.7_4.7.2-5+rpi1 gcc-4.6_4.6.3-14+rpi1 gcc-4.7_4.7.2-5+rpi1 libc6-dev_2.13-38+rpi2+deb7u8 libstdc++6_4.7.2-5+rpi1 libstdc++6-4.6-dev_4.6.3-14+rpi1 libstdc++6-4.7-dev_4.7.2-5+rpi1 linux-libc-dev_3.2.51-1+rpi1
Package versions: apt_0.9.7.9+rpi1+deb7u7 base-files_7.1wheezy8+rpi1 base-passwd_3.5.26 bash_4.2+dfsg-0.1+deb7u3 binutils_2.22-8+deb7u2 bsdmainutils_9.0.3 bsdutils_1:2.20.1-5.3 build-essential_11.5+b1 bzip2_1.0.6-4 coreutils_8.13-3.5 cpio_2.11+dfsg-0.1+deb7u1 cpp_4:4.6.3-8 cpp-4.6_4.6.3-14+rpi1 cpp-4.7_4.7.2-5+rpi1 dash_0.5.7-3 debconf_1.5.49 debconf-i18n_1.5.49 debfoster_2.7-1.2 debhelper_9.20120909 debianutils_4.3.2 diffutils_1:3.2-6 dpkg_1.16.16+rpi1 dpkg-dev_1.16.16+rpi1 e2fslibs_1.42.5-1.1+deb7u1 e2fsprogs_1.42.5-1.1+deb7u1 fakeroot_1.18.4-2 file_5.11-2+deb7u9 findutils_4.4.2-4 g++_4:4.6.3-8 g++-4.6_4.6.3-14+rpi1 g++-4.7_4.7.2-5+rpi1 gcc_4:4.6.3-8 gcc-4.5-base_4.5.3-12+rpi1 gcc-4.6_4.6.3-14+rpi1 gcc-4.6-base_4.6.3-14+rpi1 gcc-4.7_4.7.2-5+rpi1 gcc-4.7-base_4.7.2-5+rpi1 gettext_0.18.1.1-9 gettext-base_0.18.1.1-9 gnupg_1.4.12-7+deb7u7 gpgv_1.4.12-7+deb7u7 grep_2.12-2 groff-base_1.21-9 gzip_1.5-1.1 hostname_3.11 html2text_1.3.2a-15 initramfs-tools_0.115~bpo70+1 initscripts_2.88dsf-41+deb7u1 insserv_1.14.0-5 intltool-debian_0.35.0+20060710.1 klibc-utils_2.0.1-3.1+rpi1 kmod_9-3 libacl1_2.2.51-8 libapt-pkg4.12_0.9.7.9+rpi1+deb7u7 libasprintf0c2_0.18.1.1-9 libattr1_1:2.4.46-8 libblkid1_2.20.1-5.3 libbz2-1.0_1.0.6-4 libc-bin_2.13-38+rpi2+deb7u8 libc-dev-bin_2.13-38+rpi2+deb7u8 libc6_2.13-38+rpi2+deb7u8 libc6-dev_2.13-38+rpi2+deb7u8 libclass-isa-perl_0.36-3 libcomerr2_1.42.5-1.1+deb7u1 libcroco3_0.6.6-2+deb7u1 libdb5.1_5.1.29-5 libdbus-1-3_1.6.8-1+deb7u6 libdpkg-perl_1.16.16+rpi1 libffi5_3.0.10-3+b3 libgc1c2_1:7.1-9.1 libgcc1_1:4.7.2-5+rpi1 libgdbm3_1.8.3-11 libgettextpo0_0.18.1.1-9 libglib2.0-0_2.33.12+really2.32.4-5 libgmp10_2:5.0.5+dfsg-2 libgomp1_4.7.2-5+rpi1 libklibc_2.0.1-3.1+rpi1 libkmod2_9-3 liblocale-gettext-perl_1.05-7 liblzma5_5.1.1alpha+20120614-2 libmagic1_5.11-2+deb7u9 libmount1_2.20.1-5.3 libmpc2_0.9-4 libmpfr4_3.1.0-5 libncurses5_5.9-10 libncursesw5_5.9-10 libnih-dbus1_1.0.3-4.1 libnih1_1.0.3-4.1 libnspr4_2:4.12-1+deb7u1 libnspr4-dev_2:4.12-1+deb7u1 libpam-modules_1.1.3-7.1 libpam-modules-bin_1.1.3-7.1 libpam-runtime_1.1.3-7.1 libpam0g_1.1.3-7.1 libpcre3_1:8.30-5 libpipeline1_1.2.1-1 libprocps0_1:3.3.3-3 libreadline6_6.2+dfsg-0.1 libselinux1_2.1.9-5 libsemanage-common_2.1.6-6 libsemanage1_2.1.6-6 libsepol1_2.1.4-3 libslang2_2.2.4-15 libsqlite3-0_3.7.13-1+deb7u3 libsqlite3-dev_3.7.13-1+deb7u3 libss2_1.42.5-1.1+deb7u1 libstdc++6_4.7.2-5+rpi1 libstdc++6-4.6-dev_4.6.3-14+rpi1 libstdc++6-4.7-dev_4.7.2-5+rpi1 libswitch-perl_2.16-2 libtext-charwidth-perl_0.04-7 libtext-iconv-perl_1.7-5 libtext-wrapi18n-perl_0.06-7 libtimedate-perl_1.2000-1 libtinfo5_5.9-10 libudev0_175-7.2 libunistring0_0.9.3-5 libusb-0.1-4_2:0.1.12-20+nmu1 libustr-1.0-1_1.0.4-3 libuuid1_2.20.1-5.3 libxml2_2.8.0+dfsg1-7+wheezy7 linux-libc-dev_3.2.51-1+rpi1 login_1:4.1.5.1-1 lsb-base_4.1+Debian8+rpi1+deb7u1 make_3.81-8.2 makedev_2.3.1-92 man-db_2.6.2-1 mawk_1.3.3-17 mount_2.20.1-5.3 mountall_2.46 multiarch-support_2.13-38+rpi2+deb7u8 ncurses-base_5.9-10 ncurses-bin_5.9-10 passwd_1:4.1.5.1-1 patch_2.6.1-3 perl_5.14.2-21+rpi2+deb7u2 perl-base_5.14.2-21+rpi2+deb7u2 perl-modules_5.14.2-21+rpi2+deb7u2 plymouth_0.8.5.1-5 po-debconf_1.0.16+nmu2 procps_1:3.3.3-3 raspbian-archive-keyring_20120528.2 readline-common_6.2+dfsg-0.1 sbuild-build-depends-core-dummy_0.invalid.0 sbuild-build-depends-nss-dummy_0.invalid.0 sed_4.2.1-10 sensible-utils_0.0.7 sysv-rc_2.88dsf-41+deb7u1 sysvinit_2.88dsf-41+deb7u1 sysvinit-utils_2.88dsf-41+deb7u1 tar_1.26+dfsg-0.1 tzdata_2015f-0+deb7u1 udev_175-7.2 util-linux_2.20.1-5.3 xz-utils_5.1.1alpha+20120614-2 zlib1g_1:1.2.7.dfsg-13 zlib1g-dev_1:1.2.7.dfsg-13
+------------------------------------------------------------------------------+
| Build |
+------------------------------------------------------------------------------+
Unpack source
-------------
gpgv: keyblock resource `/sbuild-nonexistent/.gnupg/trustedkeys.gpg': file open error
gpgv: Signature made Tue May 30 20:44:53 2017 UTC using RSA key ID 9426876F
gpgv: Can't check signature: public key not found
dpkg-source: warning: failed to verify signature on ./nss_3.26-1+debu7u4.dsc
dpkg-source: info: extracting nss in /<<PKGBUILDDIR>>
dpkg-source: info: unpacking nss_3.26.orig.tar.gz
dpkg-source: info: unpacking nss_3.26-1+debu7u4.debian.tar.gz
dpkg-source: info: applying nss-3.26.2.patch
dpkg-source: info: applying 38_hurd.patch
dpkg-source: info: applying 38_kbsd.patch
dpkg-source: info: applying 80_security_tools.patch
dpkg-source: info: applying 85_security_load.patch
dpkg-source: info: applying replace_expired_paypal_cert.patch
dpkg-source: info: applying customize-gcc.patch
dpkg-source: info: applying CVE-2017-5461.patch
dpkg-source: info: applying CVE-2017-5462.patch
dpkg-source: info: applying CVE-2017-7502.patch
Check disc space
----------------
df: Warning: cannot read table of mounted file systems: No such file or directory
Sufficient free space for build
User Environment
----------------
APT_CONFIG=/var/lib/sbuild/apt.conf
DEB_BUILD_OPTIONS=parallel=4
HOME=/sbuild-nonexistent
LC_ALL=POSIX
LOGNAME=buildd
PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games
SCHROOT_ALIAS_NAME=wheezy-staging-armhf-sbuild
SCHROOT_CHROOT_NAME=wheezy-staging-armhf-sbuild
SCHROOT_COMMAND=env
SCHROOT_GID=109
SCHROOT_GROUP=buildd
SCHROOT_SESSION_ID=wheezy-staging-armhf-sbuild-f94001d0-c346-441d-87a3-887be1052123
SCHROOT_UID=104
SCHROOT_USER=buildd
SHELL=/bin/sh
TERM=linux
USER=buildd
dpkg-buildpackage
-----------------
dpkg-buildpackage: source package nss
dpkg-buildpackage: source version 2:3.26-1+debu7u4
dpkg-source --before-build nss-3.26
dpkg-buildpackage: host architecture armhf
fakeroot debian/rules clean
dh clean
dh_testdir
debian/rules override_dh_auto_clean
make[1]: Entering directory `/<<PKGBUILDDIR>>'
/usr/bin/make -C nss \
clobber \
SOURCE_PREFIX=/<<PKGBUILDDIR>>/dist \
SOURCE_MD_DIR=/<<PKGBUILDDIR>>/dist \
DIST=/<<PKGBUILDDIR>>/dist \
BUILD_OPT=1 \
make[2]: Entering directory `/<<PKGBUILDDIR>>/nss'
coreconf/Werror.mk:90: Unable to find gcc 4.8 or greater, disabling -Werror
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
cd coreconf; /usr/bin/make clobber
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/coreconf'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
cd nsinstall; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/coreconf/nsinstall'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pathsub.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/coreconf/nsinstall'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/coreconf'
cd lib; /usr/bin/make clobber
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/lib'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
cd util; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/util'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil3.so Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/quickder.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secdig.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derdec.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derenc.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dersubr.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dertime.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/errstrs.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssb64d.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssb64e.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssrwlk.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssilock.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/oidstring.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs1sig.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/portreg.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secalgid.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1d.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1e.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1u.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secitem.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secload.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secoid.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sectime.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secport.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/templates.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utf8.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilmod.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilpars.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/util'
cd freebl; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/freebl'
Makefile:636: warning: overriding commands for target `Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB'
Makefile:623: warning: ignoring old commands for target `Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libfreebl.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libfreebl3.so Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/loader.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/freebl'
cd sqlite; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/sqlite'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsqlite.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsqlite3.so Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sqlite3.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/sqlite'
cd dbm; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dbm'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
cd include; /usr/bin/make clobber
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dbm/include'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dbm/include'
cd src; /usr/bin/make clobber
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dbm/src'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libdbm.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/db.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_bigkey.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_func.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_log2.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_page.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash_buf.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mktemp.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dirent.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dbm/src'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dbm'
cd softoken; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/softoken'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn3.so Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipsaudt.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstokn.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgglue.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowkey.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowpbe.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/padbuf.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11c.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11u.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sdb.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkdb.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkhmac.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkpars.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkpwd.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/softkver.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tlsprf.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jpakesftk.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
cd legacydb; /usr/bin/make clobber
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/softoken/legacydb'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm3.so Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dbmshim.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/keydb.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgattr.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgcreate.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgdestroy.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgfind.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgfips.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lginit.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgutil.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowcert.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowkey.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pcertdb.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11db.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/softoken/legacydb'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/softoken'
cd base; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/base'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssb.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/arena.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/error.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/errorval.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hashops.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libc.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tracker.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/item.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utf8.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/list.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/base'
cd dev; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dev'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdev.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devslot.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devtoken.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devutil.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ckhelper.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dev'
cd pki; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pki'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnsspki.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/asymmkey.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certificate.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cryptocontext.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/symmkey.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/trustdomain.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tdcache.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdecode.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkistore.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkibase.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pki3hack.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pki'
cd libpkix; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
cd include; /usr/bin/make clobber
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/include'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/include'
cd pkix; /usr/bin/make clobber
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
cd certsel; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/certsel'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcertsel.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_certselector.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/certsel'
cd crlsel; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/crlsel'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcrlsel.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_crlselector.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/crlsel'
cd checker; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/checker'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixchecker.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_crlchecker.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_policychecker.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/checker'
cd params; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/params'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixparams.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_trustanchor.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_procparams.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_valparams.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/params'
cd results; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/results'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixresults.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_buildresult.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_policynode.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_valresult.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_verifynode.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/results'
cd store; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/store'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixstore.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_store.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/store'
cd top; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/top'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixtop.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_validate.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_lifecycle.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_build.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/top'
cd util; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/util'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixutil.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_tools.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_error.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_logger.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_list.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_errpaths.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/util'
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix'
cd pkix_pl_nss; /usr/bin/make clobber
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
cd pki; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/pki'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixpki.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_cert.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crl.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_date.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/system'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixsystem.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_common.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_error.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_mem.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_object.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_oid.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_string.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/system'
cd module; /usr/bin/make clobber
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/module'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixmodule.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_socket.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/module'
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix'
cd certdb; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/certdb'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcertdb.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/alg1485.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdb.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certv3.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certxutl.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crl.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/genname.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/stanpcertdb.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/polcyxtn.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secname.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xauthkid.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xbsconst.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xconst.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/certdb'
cd certhigh; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/certhigh'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcerthi.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certhtml.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certreq.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlv2.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocsp.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspsig.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certhigh.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certvfy.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certvfypkix.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xcrldist.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/certhigh'
cd pk11wrap; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pk11wrap'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpk11wrap.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dev3hack.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11akey.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11auth.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11cert.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11cxt.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11err.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11kea.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11list.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11load.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11mech.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11merge.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11nobj.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11obj.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pars.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pbe.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pk12.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pqg.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11sdr.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11skey.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11slot.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11util.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pk11wrap'
cd cryptohi; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/cryptohi'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcryptohi.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sechash.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/seckey.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secsign.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secvfy.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dsautil.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/cryptohi'
cd nss; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/nss'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss3.so Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssinit.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssoptions.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssver.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilwrap.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/nss'
cd ssl; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/ssl'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl3.so Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derive.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dtlscon.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/prelib.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3con.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslauth.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslcon.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssldef.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslenum.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslerr.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslinit.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3ext.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslmutex.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslnonce.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslreveal.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsecur.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsnce.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsock.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssltrace.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslver.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/authcert.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmpcert.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslinfo.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls13con.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls13hkdf.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslcert.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/unix_err.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/ssl'
cd pkcs7; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pkcs7'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs7.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certread.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7common.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7create.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7decode.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7encode.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7local.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secmime.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pkcs7'
cd pkcs12; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pkcs12'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs12.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12local.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12creat.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12dec.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12plcy.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12tmpl.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12e.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12d.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pkcs12'
cd smime; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/smime'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime3.so Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsarray.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsasn1.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsattr.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmscinfo.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmscipher.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdecode.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdigest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsencdata.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsencode.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsmessage.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmspubkey.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsreclist.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmssigdata.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsudf.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsutil.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimemessage.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimeutil.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimever.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/smime'
cd crmf; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/crmf'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcrmf.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfenc.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmftmpl.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfreq.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfpop.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfdec.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfget.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfcont.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfasn1.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfresp.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfrec.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfchal.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/servget.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/encutil.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/respcli.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/respcmn.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/challcli.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/asn1cmn.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/crmf'
cd jar; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/jar'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libjar.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarver.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarsign.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jar.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jar-ds.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarfile.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarint.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/jar'
cd ckfw; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/ckfw'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckfw.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crypto.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/find.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/instance.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mutex.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/object.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/session.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sessobj.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/slot.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/token.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/wrap.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mechanism.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
cd builtins; /usr/bin/make clobber
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/ckfw/builtins'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckbi.so Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/anchor.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/constants.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bfind.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/binst.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bobject.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bsession.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bslot.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/btoken.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdata.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ckbiver.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/ckfw/builtins'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/ckfw'
cd sysinit; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/sysinit'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnsssysinit.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnsssysinit.so Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsssysinit.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/sysinit'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib'
cd cmd; /usr/bin/make clobber
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
cd lib; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/lib'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsectool.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/basicutil.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secutil.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secpwd.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derprint.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/moreoids.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pppolicy.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ffs.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11table.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/lib'
cd bltest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/bltest'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bltest Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/blapitest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/bltest'
cd fipstest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/fipstest'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstest Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/fipstest'
cd lowhashtest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/lowhashtest'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowhashtest Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowhashtest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/lowhashtest'
cd shlibsign; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/shlibsign Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/shlibsign.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations /<<PKGBUILDDIR>>/dist/lib/libsoftokn3.chk /<<PKGBUILDDIR>>/dist/lib/libnssdbm3.chk
cd mangle; /usr/bin/make clobber
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign/mangle'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mangle Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mangle.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign/mangle'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign'
cd addbuiltin; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/addbuiltin'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/addbuiltin Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/addbuiltin.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/addbuiltin'
cd atob; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/atob'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/atob Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/atob.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/atob'
cd btoa; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/btoa'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/btoa Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/btoa.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/btoa'
cd certcgi; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/certcgi'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certcgi Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certcgi.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/certcgi'
cd certutil; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/certutil'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certutil Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certext.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certutil.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/keystuff.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/certutil'
cd chktest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/chktest'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/chktest Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/chktest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/chktest'
cd crlutil; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/crlutil'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlutil Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlgen_lex.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlgen.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlutil.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/crlutil'
cd crmftest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/crmftest'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmftest Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/testcrmf.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/crmftest'
cd dbtest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/dbtest'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dbtest Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dbtest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/dbtest'
cd derdump; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/derdump'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derdump Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derdump.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/derdump'
cd digest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/digest'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/digest Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/digest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/digest'
cd ecperf; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ecperf'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ecperf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ecperf.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ecperf'
cd ectest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ectest'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ectest Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ectest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ectest'
cd httpserv; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/httpserv'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/httpserv Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/httpserv.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/httpserv'
cd listsuites; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/listsuites'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/listsuites Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/listsuites.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/listsuites'
cd makepqg; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/makepqg'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/makepqg Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/makepqg.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/makepqg'
cd multinit; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/multinit'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/multinit Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/multinit.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/multinit'
cd ocspclnt; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ocspclnt'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspclnt Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspclnt.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ocspclnt'
cd ocspresp; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ocspresp'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspresp Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspresp.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ocspresp'
cd oidcalc; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/oidcalc'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/oidcalc Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/oidcalc.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/oidcalc'
cd p7content; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7content'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7content Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7content.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7content'
cd p7env; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7env'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7env Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7env.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7env'
cd p7sign; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7sign'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7sign Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7sign.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7sign'
cd p7verify; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7verify'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7verify Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7verify.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7verify'
cd pk12util; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk12util'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk12util Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk12util.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk12util'
cd pk11gcmtest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk11gcmtest'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11gcmtest Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11gcmtest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk11gcmtest'
cd pk11mode; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk11mode'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11mode Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11mode.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk11mode'
cd pk1sign; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk1sign'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk1sign Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk1sign.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk1sign'
cd pp; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pp'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pp Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pp.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pp'
cd pwdecrypt; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pwdecrypt'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pwdecrypt Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pwdecrypt.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pwdecrypt'
cd rsaperf; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/rsaperf'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/rsaperf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/rsaperf.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/defkey.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/rsaperf'
cd sdrtest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/sdrtest'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sdrtest Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sdrtest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/sdrtest'
cd selfserv; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/selfserv'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/selfserv Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/selfserv.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/selfserv'
cd signtool; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/signtool'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signtool Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signtool.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certgen.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/javascript.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/list.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sign.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/verify.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/zip.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/signtool'
cd signver; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/signver'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signver Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signver.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk7print.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/signver'
cd smimetools; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/smimetools'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsutil Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsutil.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/smimetools'
cd ssltap; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ssltap'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssltap Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssltap.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ssltap'
cd strsclnt; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/strsclnt'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/strsclnt Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/strsclnt.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/strsclnt'
cd symkeyutil; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/symkeyutil'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/symkeyutil Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/symkeyutil.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/symkeyutil'
cd tests; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/tests'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/baddbdir Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/conflict Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dertimetest Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/encodeinttest Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nonspr10 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/remtest Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secmodtest Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/baddbdir.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/conflict.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dertimetest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/encodeinttest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nonspr10.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/remtest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secmodtest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/tests'
cd tstclnt; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/tstclnt'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tstclnt Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tstclnt.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/tstclnt'
cd vfychain; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/vfychain'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfychain Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfychain.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/vfychain'
cd vfyserv; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/vfyserv'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfyserv Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfyserv.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfyutil.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/vfyserv'
cd modutil; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/modutil'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/modutil Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/modutil.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/instsec.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/install.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/installparse.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/install-ds.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/modutil'
cd pkix-errcodes; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pkix-errcodes'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix-errcodes Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix-errcodes.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pkix-errcodes'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd'
cd external_tests; /usr/bin/make clobber
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
cd google_test; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/google_test'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest1.so Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtest/src/gtest-all.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/google_test'
cd common; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/common'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtests Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtests.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/common'
cd der_gtest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/der_gtest'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/der_gtest Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/der_getint_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/der_gtest'
cd util_gtest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/util_gtest'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util_gtest Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util_utf8_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util_b64_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/util_gtest'
cd pk11_gtest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/pk11_gtest'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_gtest Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_aeskeywrap_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_chacha20poly1305_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_pbkdf2_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_prf_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_rsapss_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/pk11_gtest'
cd ssl_gtest; /usr/bin/make clobber
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/ssl_gtest'
rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_gtest Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl_internals.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_agent_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_auth_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_ciphersuite_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_dhe_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_drop_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_ems_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_extension_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_gtest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_loopback_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_resumption_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_skip_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_staticrsa_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_v2_client_hello_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_version_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/test_io.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_agent.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_connect.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_hkdf_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_filter.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_parser.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ LOGS TAGS Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/.md core so_locations
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/ssl_gtest'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests'
make[2]: Leaving directory `/<<PKGBUILDDIR>>/nss'
rm -rf /<<PKGBUILDDIR>>/dist debian/libnss3-1d.links debian/libnss3-dev.links debian/libnss3.lintian-overrides debian/nss-config debian/nss.pc
make[1]: Leaving directory `/<<PKGBUILDDIR>>'
dh_clean
debian/rules build-arch
dh build-arch
dh_testdir -a
dh_auto_configure -a
debian/rules override_dh_auto_build
make[1]: Entering directory `/<<PKGBUILDDIR>>'
/usr/bin/make -C nss \
all \
MOZILLA_CLIENT=1 \
NSPR_INCLUDE_DIR=/usr/include/nspr \
NSPR_LIB_DIR=/usr/lib \
SOURCE_PREFIX=/<<PKGBUILDDIR>>/dist \
SOURCE_MD_DIR=/<<PKGBUILDDIR>>/dist \
DIST=/<<PKGBUILDDIR>>/dist \
BUILD_OPT=1 \
OPTIMIZER="-g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2" \
LDFLAGS='-Wl,-z,relro $(ARCHFLAG) $(ZDEFS_FLAG)' \
DSO_LDOPTS='-shared $(LDFLAGS)' \
NSS_USE_SYSTEM_SQLITE=1 \
NSS_ENABLE_ECC=1 \
CHECKLOC= \
make[2]: Entering directory `/<<PKGBUILDDIR>>/nss'
coreconf/Werror.mk:90: Unable to find gcc 4.8 or greater, disabling -Werror
cd coreconf; /usr/bin/make export
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/coreconf'
cd nsinstall; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/coreconf/nsinstall'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/coreconf/nsinstall'
cd nsinstall; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/coreconf/nsinstall'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/coreconf -I/<<PKGBUILDDIR>>/dist/private/coreconf nsinstall.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pathsub.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/coreconf -I/<<PKGBUILDDIR>>/dist/private/coreconf pathsub.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/coreconf -I/<<PKGBUILDDIR>>/dist/private/coreconf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pathsub.o -Wl,-z,relro -Wl,-z,defs -lpthread -ldl -lc
true -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/coreconf/nsinstall'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/coreconf'
cd lib; /usr/bin/make export
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/lib'
cd util; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/util'
Creating /<<PKGBUILDDIR>>/dist/public/nss
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 base64.h ciferfam.h hasht.h nssb64.h nssb64t.h nsslocks.h nssilock.h nssilckt.h nssrwlk.h nssrwlkt.h nssutil.h pkcs11.h pkcs11f.h pkcs11p.h pkcs11t.h pkcs11n.h pkcs11u.h pkcs1sig.h portreg.h secasn1.h secasn1t.h seccomon.h secder.h secdert.h secdig.h secdigt.h secitem.h secoid.h secoidt.h secport.h secerr.h utilmodt.h utilrename.h utilpars.h utilparst.h /<<PKGBUILDDIR>>/dist/public/nss
Creating /<<PKGBUILDDIR>>/dist/private/nss
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 verref.h templates.c /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/util'
cd freebl; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/freebl'
Makefile:636: warning: overriding commands for target `Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB'
Makefile:623: warning: ignoring old commands for target `Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB'
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 blapit.h shsign.h ecl/ecl-exp.h nsslowhash.h /<<PKGBUILDDIR>>/dist/public/nss
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 alghmac.h blapi.h chacha20poly1305.h hmacct.h secmpi.h secrng.h ec.h ecl/ecl.h ecl/ecl-curve.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/freebl'
cd dbm; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dbm'
cd include; /usr/bin/make export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dbm/include'
Creating /<<PKGBUILDDIR>>/dist/public/dbm
../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 mcom_db.h ncompat.h winfile.h /<<PKGBUILDDIR>>/dist/public/dbm
Creating /<<PKGBUILDDIR>>/dist/private/dbm
../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 hsearch.h page.h extern.h queue.h hash.h search.h /<<PKGBUILDDIR>>/dist/private/dbm
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dbm/include'
cd src; /usr/bin/make export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dbm/src'
make[5]: Nothing to be done for `export'.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dbm/src'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dbm'
cd softoken; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/softoken'
cd legacydb; /usr/bin/make export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/softoken/legacydb'
There are no private exports.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/softoken/legacydb'
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 lowkeyi.h lowkeyti.h /<<PKGBUILDDIR>>/dist/public/nss
cd legacydb; /usr/bin/make private_export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/softoken/legacydb'
There are no private exports.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/softoken/legacydb'
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 lgglue.h pkcs11ni.h softoken.h softoknt.h softkver.h sdb.h sftkdbt.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/softoken'
cd base; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/base'
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssbaset.h nssbase.h /<<PKGBUILDDIR>>/dist/public/nss
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 baset.h base.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/base'
cd dev; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dev'
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckhelper.h devm.h devtm.h devt.h dev.h nssdevt.h nssdev.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dev'
cd pki; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pki'
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pki.h pkit.h nsspkit.h nsspki.h pkistore.h pki3hack.h pkitm.h pkim.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pki'
cd libpkix; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix'
cd include; /usr/bin/make export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/include'
../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h /<<PKGBUILDDIR>>/dist/private/nss
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/include'
cd pkix; /usr/bin/make export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix'
cd certsel; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/certsel'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/certsel'
cd crlsel; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/crlsel'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/crlsel'
cd checker; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/checker'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/checker'
cd params; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/params'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/params'
cd results; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/results'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/results'
cd store; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/store'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/store'
cd top; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/top'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/top'
cd util; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/util'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/util'
cd certsel; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/certsel'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/certsel'
cd crlsel; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/crlsel'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/crlsel'
cd checker; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/checker'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/checker'
cd params; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/params'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/params'
cd results; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/results'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/results'
cd store; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/store'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/store'
cd top; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/top'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/top'
cd util; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/util'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/util'
There are no private exports.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix'
cd pkix_pl_nss; /usr/bin/make export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss'
cd pki; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/pki'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/system'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/system'
cd module; /usr/bin/make export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/module'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/module'
cd pki; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/pki'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/system'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/system'
cd module; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/module'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/module'
There are no private exports.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss'
cd include; /usr/bin/make private_export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/include'
../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h pkix_crlsel.h pkix_errorstrings.h pkix_results.h pkixt.h pkix_certsel.h pkix_params.h pkix_revchecker.h pkix_certstore.h pkix_pl_pki.h pkix_sample_modules.h pkix_checker.h pkix_pl_system.h pkix_util.h /<<PKGBUILDDIR>>/dist/private/nss
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/include'
cd pkix; /usr/bin/make private_export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix'
cd certsel; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/certsel'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h pkix_comcertselparams.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/certsel'
cd crlsel; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/crlsel'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h pkix_crlselector.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/crlsel'
cd checker; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/checker'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h pkix_certchainchecker.h pkix_crlchecker.h pkix_ekuchecker.h pkix_expirationchecker.h pkix_namechainingchecker.h pkix_nameconstraintschecker.h pkix_ocspchecker.h pkix_policychecker.h pkix_revocationmethod.h pkix_revocationchecker.h pkix_signaturechecker.h pkix_targetcertchecker.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/checker'
cd params; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/params'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h pkix_trustanchor.h pkix_valparams.h pkix_resourcelimits.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/params'
cd results; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/results'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h pkix_policynode.h pkix_valresult.h pkix_verifynode.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/results'
cd store; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/store'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/store'
cd top; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/top'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h pkix_lifecycle.h pkix_validate.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/top'
cd util; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/util'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h pkix_error.h pkix_logger.h pkix_list.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/util'
There are no private exports.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix'
cd pkix_pl_nss; /usr/bin/make private_export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss'
cd pki; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/pki'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h pkix_pl_cert.h pkix_pl_certpolicyinfo.h pkix_pl_certpolicymap.h pkix_pl_certpolicyqualifier.h pkix_pl_crl.h pkix_pl_crldp.h pkix_pl_crlentry.h pkix_pl_date.h pkix_pl_generalname.h pkix_pl_infoaccess.h pkix_pl_nameconstraints.h pkix_pl_ocsprequest.h pkix_pl_ocspresponse.h pkix_pl_publickey.h pkix_pl_x500name.h pkix_pl_ocspcertid.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/system'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h pkix_pl_mem.h pkix_pl_object.h pkix_pl_string.h pkix_pl_primhash.h pkix_pl_bigint.h pkix_pl_mutex.h pkix_pl_bytearray.h pkix_pl_lifecycle.h pkix_pl_oid.h pkix_pl_hashtable.h pkix_pl_rwlock.h pkix_pl_monitorlock.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/system'
cd module; /usr/bin/make private_export
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/module'
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h pkix_pl_colcertstore.h pkix_pl_httpcertstore.h pkix_pl_httpdefaultclient.h pkix_pl_ldapt.h pkix_pl_ldapcertstore.h pkix_pl_ldapresponse.h pkix_pl_ldaprequest.h pkix_pl_ldapdefaultclient.h pkix_pl_nsscontext.h pkix_pl_pk11certstore.h pkix_pl_socket.h /<<PKGBUILDDIR>>/dist/private/nss
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/module'
There are no private exports.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss'
There are no private exports.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix'
cd certdb; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/certdb'
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cert.h certt.h certdb.h /<<PKGBUILDDIR>>/dist/public/nss
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 genname.h xconst.h certxutl.h certi.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/certdb'
cd certhigh; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/certhigh'
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocsp.h ocspt.h /<<PKGBUILDDIR>>/dist/public/nss
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocspti.h ocspi.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/certhigh'
cd pk11wrap; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pk11wrap'
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmod.h secmodt.h secpkcs5.h pk11func.h pk11pub.h pk11priv.h pk11sdr.h pk11pqg.h /<<PKGBUILDDIR>>/dist/public/nss
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmodi.h dev3hack.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pk11wrap'
cd cryptohi; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/cryptohi'
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cryptohi.h cryptoht.h key.h keyhi.h keyt.h keythi.h sechash.h /<<PKGBUILDDIR>>/dist/public/nss
There are no private exports.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/cryptohi'
cd nss; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/nss'
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nss.h /<<PKGBUILDDIR>>/dist/public/nss
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssrenam.h nssoptions.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/nss'
cd ssl; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/ssl'
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ssl.h sslt.h sslerr.h sslproto.h preenc.h /<<PKGBUILDDIR>>/dist/public/nss
There are no private exports.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/ssl'
cd pkcs7; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pkcs7'
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmime.h secpkcs7.h pkcs7t.h /<<PKGBUILDDIR>>/dist/public/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pkcs7'
cd pkcs12; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pkcs12'
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs12t.h pkcs12.h p12plcy.h p12.h p12t.h /<<PKGBUILDDIR>>/dist/public/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pkcs12'
cd smime; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/smime'
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cms.h cmst.h smime.h cmsreclist.h /<<PKGBUILDDIR>>/dist/public/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/smime'
cd crmf; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/crmf'
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmf.h crmft.h cmmf.h cmmft.h /<<PKGBUILDDIR>>/dist/public/nss
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmfi.h crmfit.h cmmfi.h cmmfit.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/crmf'
cd jar; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/jar'
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 jar.h jar-ds.h jarfile.h /<<PKGBUILDDIR>>/dist/public/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/jar'
cd ckfw; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/ckfw'
cd builtins; /usr/bin/make export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/ckfw/builtins'
../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckbi.h /<<PKGBUILDDIR>>/dist/public/nss
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/ckfw/builtins'
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssck.api nssckepv.h nssckft.h nssckfw.h nssckfwc.h nssckfwt.h nssckg.h nssckmdt.h nssckt.h /<<PKGBUILDDIR>>/dist/public/nss
cd builtins; /usr/bin/make private_export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/ckfw/builtins'
There are no private exports.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/ckfw/builtins'
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ck.h ckfw.h ckfwm.h ckfwtm.h ckmd.h ckt.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/ckfw'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib'
cd cmd; /usr/bin/make export
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd'
cd lib; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/lib'
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 basicutil.h secutil.h pk11table.h /<<PKGBUILDDIR>>/dist/private/nss
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/lib'
cd bltest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/bltest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/bltest'
cd fipstest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/fipstest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/fipstest'
cd lowhashtest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/lowhashtest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/lowhashtest'
cd shlibsign; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign'
cd mangle; /usr/bin/make export
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign/mangle'
make[5]: Nothing to be done for `export'.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign/mangle'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign'
cd addbuiltin; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/addbuiltin'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/addbuiltin'
cd atob; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/atob'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/atob'
cd btoa; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/btoa'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/btoa'
cd certcgi; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/certcgi'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/certcgi'
cd certutil; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/certutil'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/certutil'
cd chktest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/chktest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/chktest'
cd crlutil; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/crlutil'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/crlutil'
cd crmftest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/crmftest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/crmftest'
cd dbtest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/dbtest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/dbtest'
cd derdump; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/derdump'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/derdump'
cd digest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/digest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/digest'
cd ecperf; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ecperf'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ecperf'
cd ectest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ectest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ectest'
cd httpserv; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/httpserv'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/httpserv'
cd listsuites; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/listsuites'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/listsuites'
cd makepqg; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/makepqg'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/makepqg'
cd multinit; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/multinit'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/multinit'
cd ocspclnt; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ocspclnt'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ocspclnt'
cd ocspresp; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ocspresp'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ocspresp'
cd oidcalc; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/oidcalc'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/oidcalc'
cd p7content; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7content'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7content'
cd p7env; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7env'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7env'
cd p7sign; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7sign'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7sign'
cd p7verify; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7verify'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7verify'
cd pk12util; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk12util'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk12util'
cd pk11gcmtest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk11gcmtest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk11gcmtest'
cd pk11mode; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk11mode'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk11mode'
cd pk1sign; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk1sign'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk1sign'
cd pp; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pp'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pp'
cd pwdecrypt; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pwdecrypt'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pwdecrypt'
cd rsaperf; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/rsaperf'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/rsaperf'
cd sdrtest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/sdrtest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/sdrtest'
cd selfserv; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/selfserv'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/selfserv'
cd signtool; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/signtool'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/signtool'
cd signver; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/signver'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/signver'
cd smimetools; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/smimetools'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/smimetools'
cd ssltap; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ssltap'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ssltap'
cd strsclnt; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/strsclnt'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/strsclnt'
cd symkeyutil; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/symkeyutil'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/symkeyutil'
cd tests; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/tests'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/tests'
cd tstclnt; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/tstclnt'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/tstclnt'
cd vfychain; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/vfychain'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/vfychain'
cd vfyserv; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/vfyserv'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/vfyserv'
cd modutil; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/modutil'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/modutil'
cd pkix-errcodes; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pkix-errcodes'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pkix-errcodes'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd'
cd external_tests; /usr/bin/make export
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests'
cd google_test; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/google_test'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/google_test'
cd common; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/common'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/common'
cd der_gtest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/der_gtest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/der_gtest'
cd util_gtest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/util_gtest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/util_gtest'
cd pk11_gtest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/pk11_gtest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/pk11_gtest'
cd ssl_gtest; /usr/bin/make export
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/ssl_gtest'
make[4]: Nothing to be done for `export'.
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/ssl_gtest'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests'
cd coreconf; /usr/bin/make libs
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/coreconf'
cd nsinstall; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/coreconf/nsinstall'
true -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/coreconf/nsinstall'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/coreconf'
cd lib; /usr/bin/make libs
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/lib'
cd util; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/util'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/quickder.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss quickder.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secdig.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss secdig.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derdec.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss derdec.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derenc.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss derenc.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dersubr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss dersubr.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dertime.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss dertime.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/errstrs.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss errstrs.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssb64d.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss nssb64d.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssb64e.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss nssb64e.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssrwlk.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss nssrwlk.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssilock.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss nssilock.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/oidstring.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss oidstring.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs1sig.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkcs1sig.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/portreg.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss portreg.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secalgid.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss secalgid.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1d.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss secasn1d.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1e.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss secasn1e.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1u.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss secasn1u.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secitem.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss secitem.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secload.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss secload.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secoid.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss secoid.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sectime.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss sectime.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secport.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss secport.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/templates.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss templates.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utf8.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss utf8.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilmod.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss utilmod.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilpars.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss utilpars.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/quickder.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secdig.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derdec.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derenc.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dersubr.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dertime.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/errstrs.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssb64d.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssb64e.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssrwlk.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssilock.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/oidstring.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs1sig.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/portreg.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secalgid.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1d.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1e.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1u.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secitem.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secload.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secoid.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sectime.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secport.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/templates.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utf8.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilmod.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilpars.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil.a
grep -v ';-' nssutil.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssutil.def
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil3.so
gcc-4.7 -shared -Wl,-z,relro -Wl,-z,defs -Wl,-soname -Wl,libnssutil3.so -Wl,--version-script,Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssutil.def -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil3.so Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/quickder.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secdig.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derdec.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derenc.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dersubr.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dertime.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/errstrs.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssb64d.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssb64e.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssrwlk.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssilock.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/oidstring.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs1sig.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/portreg.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secalgid.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1d.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1e.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secasn1u.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secitem.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secload.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secoid.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sectime.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secport.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/templates.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utf8.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilmod.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilpars.o -L/<<PKGBUILDDIR>>/dist/lib -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
chmod +x Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil3.so
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil.a /<<PKGBUILDDIR>>/dist/lib
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssutil3.so /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/util'
cd freebl; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/freebl'
Makefile:636: warning: overriding commands for target `Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB'
Makefile:623: warning: ignoring old commands for target `Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/loader.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl loader.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libfreebl.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libfreebl.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/loader.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libfreebl.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libfreebl.a
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libfreebl.a /<<PKGBUILDDIR>>/dist/lib
mkdir Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB
/usr/bin/make FREEBL_CHILD_BUILD=1 \
OBJDIR=Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/freebl'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freeblver.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl freeblver.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ldvector.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl ldvector.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sysrand.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl sysrand.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha_fast.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl sha_fast.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md2.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl md2.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md5.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl md5.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha512.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl sha512.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alghmac.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl alghmac.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rawhash.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl rawhash.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alg2268.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl alg2268.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfour.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl arcfour.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfive.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl arcfive.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/desblapi.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl -fno-strict-aliasing desblapi.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/des.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl des.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/drbg.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl drbg.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/chacha20poly1305.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl chacha20poly1305.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/cts.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl cts.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ctr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl ctr.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/fipsfreebl.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl fipsfreebl.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/gcm.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl gcm.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/hmacct.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl hmacct.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rijndael.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl rijndael.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/aeskeywrap.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl aeskeywrap.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/camellia.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl camellia.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dh.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl dh.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl ec.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecdecode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl ecdecode.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/pqg.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl pqg.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dsa.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl dsa.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rsa.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl rsa.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rsapkcs.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl rsapkcs.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/shvfy.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl shvfy.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/tlsprfalg.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl tlsprfalg.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/seed.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl seed.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/jpake.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl jpake.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpprime.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl mpi/mpprime.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpmontg.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl mpi/mpmontg.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mplogic.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl mpi/mplogic.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl mpi/mpi.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mp_gf2m.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl mpi/mp_gf2m.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi_arm.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl mpi/mpi_arm.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpcpucache.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl mpi/mpcpucache.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl ecl/ecl.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_curve.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl ecl/ecl_curve.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_mult.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl ecl/ecl_mult.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_gf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl ecl/ecl_gf.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_aff.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl ecl/ecp_aff.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jac.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl ecl/ecp_jac.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_mont.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl ecl/ecp_mont.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec_naf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl ecl/ec_naf.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jm.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl ecl/ecp_jm.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_256.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl ecl/ecp_256.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_384.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl ecl/ecp_384.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_521.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl ecl/ecp_521.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_256_32.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl ecl/ecp_256_32.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/stubs.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl stubs.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/nsslowhash.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl nsslowhash.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/poly1305.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl poly1305.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/chacha20.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl chacha20.c
grep -v ';-' freebl_hash_vector.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freeblpriv.def
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreeblpriv3.so
gcc-4.7 -shared -Wl,-z,relro -Wl,-z,defs -Wl,-soname -Wl,libfreeblpriv3.so -Wl,--version-script,Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freeblpriv.def -Wl,-Bsymbolic -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreeblpriv3.so Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freeblver.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ldvector.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sysrand.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha_fast.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md2.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md5.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha512.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alghmac.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rawhash.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alg2268.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfour.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfive.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/desblapi.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/des.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/drbg.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/chacha20poly1305.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/cts.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ctr.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/fipsfreebl.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/gcm.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/hmacct.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rijndael.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/aeskeywrap.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/camellia.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dh.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecdecode.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/pqg.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dsa.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rsa.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rsapkcs.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/shvfy.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/tlsprfalg.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/seed.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/jpake.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpprime.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpmontg.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mplogic.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mp_gf2m.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi_arm.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpcpucache.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_curve.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_mult.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecl_gf.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_aff.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jac.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_mont.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec_naf.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_jm.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_256.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_384.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_521.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_256_32.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/stubs.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/nsslowhash.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/poly1305.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/chacha20.o -ldl -lc
chmod +x Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreeblpriv3.so
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreeblpriv3.so /<<PKGBUILDDIR>>/dist/lib
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/freebl'
/usr/bin/make FREEBL_CHILD_BUILD=1 USE_STUB_BUILD=1 \
OBJDIR=Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/freebl'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/lowhash_vector.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_USE_UINT_DIGIT -DSHA_NO_LONG_LONG -DMP_API_COMPATIBLE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -Impi -Iecl lowhash_vector.c
grep -v ';-' freebl_hash.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freebl.def
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so
gcc-4.7 -shared -Wl,-z,relro -Wl,-z,defs -Wl,-soname -Wl,libfreebl3.so -Wl,--version-script,Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freebl.def -Wl,-Bsymbolic -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/lowhash_vector.o -ldl -lc
chmod +x Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so /<<PKGBUILDDIR>>/dist/lib
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/freebl'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/freebl'
cd dbm; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dbm'
cd include; /usr/bin/make libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dbm/include'
make[5]: Nothing to be done for `libs'.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dbm/include'
cd src; /usr/bin/make libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dbm/src'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/db.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/dbm db.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_bigkey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/dbm h_bigkey.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_func.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/dbm h_func.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_log2.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/dbm h_log2.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_page.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/dbm h_page.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/dbm hash.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash_buf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/dbm hash_buf.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mktemp.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/dbm mktemp.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dirent.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/dbm dirent.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libdbm.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libdbm.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/db.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_bigkey.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_func.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_log2.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/h_page.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash_buf.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mktemp.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dirent.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libdbm.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libdbm.a
../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libdbm.a /<<PKGBUILDDIR>>/dist/lib
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dbm/src'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dbm'
cd softoken; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/softoken'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipsaudt.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss fipsaudt.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss fipstest.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstokn.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss fipstokn.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgglue.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss lgglue.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowkey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss lowkey.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowpbe.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss lowpbe.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/padbuf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss padbuf.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkcs11.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11c.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkcs11c.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11u.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkcs11u.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sdb.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss sdb.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkdb.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss sftkdb.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkhmac.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss sftkhmac.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkpars.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss sftkpars.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkpwd.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss sftkpwd.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/softkver.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss softkver.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tlsprf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss tlsprf.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jpakesftk.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss jpakesftk.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipsaudt.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstokn.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgglue.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowkey.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowpbe.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/padbuf.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11c.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11u.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sdb.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkdb.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkhmac.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkpars.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkpwd.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/softkver.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tlsprf.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jpakesftk.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn.a
grep -v ';-' softokn.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/softokn.def
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn3.so
gcc-4.7 -shared -Wl,-z,relro -Wl,-z,defs -Wl,-soname -Wl,libsoftokn3.so -Wl,--version-script,Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/softokn.def -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn3.so Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipsaudt.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstokn.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgglue.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowkey.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowpbe.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/padbuf.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11c.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkcs11u.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sdb.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkdb.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkhmac.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkpars.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sftkpwd.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/softkver.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tlsprf.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jpakesftk.o /<<PKGBUILDDIR>>/dist/lib/libfreebl.a -L/<<PKGBUILDDIR>>/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
chmod +x Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn3.so
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn.a /<<PKGBUILDDIR>>/dist/lib
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn3.so /<<PKGBUILDDIR>>/dist/lib
cd legacydb; /usr/bin/make libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/softoken/legacydb'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dbmshim.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm dbmshim.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/keydb.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm keydb.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgattr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm lgattr.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgcreate.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm lgcreate.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgdestroy.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm lgdestroy.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgfind.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm lgfind.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgfips.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm lgfips.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lginit.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm lginit.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm lgutil.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowcert.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm lowcert.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowkey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm lowkey.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pcertdb.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm pcertdb.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11db.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DLG_LIB_NAME=\"libnssdbm3.so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm pk11db.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dbmshim.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/keydb.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgattr.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgcreate.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgdestroy.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgfind.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgfips.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lginit.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgutil.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowcert.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowkey.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pcertdb.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11db.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm.a
grep -v ';-' nssdbm.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssdbm.def
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm3.so
gcc-4.7 -shared -Wl,-z,relro -Wl,-z,defs -Wl,-soname -Wl,libnssdbm3.so -Wl,--version-script,Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssdbm.def -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm3.so Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dbmshim.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/keydb.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgattr.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgcreate.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgdestroy.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgfind.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgfips.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lginit.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lgutil.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowcert.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowkey.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pcertdb.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11db.o /<<PKGBUILDDIR>>/dist/lib/libfreebl.a /<<PKGBUILDDIR>>/dist/lib/libdbm.a -L/<<PKGBUILDDIR>>/dist/lib -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
chmod +x Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm3.so
../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm.a /<<PKGBUILDDIR>>/dist/lib
../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm3.so /<<PKGBUILDDIR>>/dist/lib
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/softoken/legacydb'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/softoken'
cd base; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/base'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/arena.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr arena.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/error.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr error.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/errorval.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr errorval.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hashops.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr hashops.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libc.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr libc.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tracker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr tracker.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/item.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr item.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utf8.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr utf8.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/list.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr list.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr hash.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssb.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssb.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/arena.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/error.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/errorval.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hashops.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libc.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tracker.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/item.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utf8.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/list.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssb.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssb.a
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssb.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/base'
cd dev; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/dev'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devslot.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr devslot.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devtoken.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr devtoken.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr devutil.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ckhelper.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr ckhelper.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdev.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdev.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devslot.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devtoken.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devutil.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ckhelper.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdev.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdev.a
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdev.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/dev'
cd pki; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pki'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/asymmkey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr asymmkey.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certificate.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr certificate.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cryptocontext.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr cryptocontext.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/symmkey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr symmkey.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/trustdomain.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr trustdomain.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tdcache.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr tdcache.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdecode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr certdecode.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkistore.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr pkistore.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkibase.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr pkibase.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pki3hack.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr pki3hack.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnsspki.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnsspki.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/asymmkey.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certificate.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cryptocontext.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/symmkey.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/trustdomain.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tdcache.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdecode.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkistore.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkibase.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pki3hack.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnsspki.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnsspki.a
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnsspki.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pki'
cd libpkix; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix'
cd include; /usr/bin/make libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/include'
make[5]: Nothing to be done for `libs'.
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/include'
cd pkix; /usr/bin/make libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix'
cd certsel; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/certsel'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_certselector.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_certselector.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_comcertselparams.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcertsel.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcertsel.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_certselector.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcertsel.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcertsel.a
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcertsel.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/certsel'
cd crlsel; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/crlsel'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_crlselector.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_crlselector.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_comcrlselparams.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcrlsel.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcrlsel.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_crlselector.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcrlsel.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcrlsel.a
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixcrlsel.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/crlsel'
cd checker; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/checker'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_basicconstraintschecker.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_certchainchecker.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_crlchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_crlchecker.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_ekuchecker.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_expirationchecker.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_namechainingchecker.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_nameconstraintschecker.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_ocspchecker.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_revocationmethod.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_revocationchecker.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_policychecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_policychecker.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_signaturechecker.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_targetcertchecker.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixchecker.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixchecker.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_crlchecker.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_policychecker.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixchecker.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixchecker.a
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixchecker.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/checker'
cd params; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/params'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_trustanchor.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_trustanchor.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_procparams.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_procparams.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_valparams.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_valparams.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_resourcelimits.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixparams.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixparams.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_trustanchor.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_procparams.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_valparams.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixparams.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixparams.a
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixparams.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/params'
cd results; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/results'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_buildresult.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_buildresult.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_policynode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_policynode.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_valresult.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_valresult.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_verifynode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_verifynode.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixresults.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixresults.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_buildresult.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_policynode.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_valresult.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_verifynode.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixresults.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixresults.a
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixresults.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/results'
cd store; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/store'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_store.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_store.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixstore.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixstore.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_store.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixstore.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixstore.a
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixstore.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/store'
cd top; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/top'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_validate.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_validate.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_lifecycle.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_lifecycle.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_build.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_build.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixtop.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixtop.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_validate.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_lifecycle.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_build.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixtop.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixtop.a
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/top'
cd util; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/util'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_tools.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_tools.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_error.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_error.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_logger.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_logger.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_list.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_list.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_errpaths.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_errpaths.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixutil.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixutil.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_tools.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_error.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_logger.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_list.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_errpaths.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixutil.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixutil.a
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixutil.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix/util'
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix'
cd pkix_pl_nss; /usr/bin/make libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss'
cd pki; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/pki'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_basicconstraints.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_cert.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_cert.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_certpolicyinfo.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_certpolicymap.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_certpolicyqualifier.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crl.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_crl.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_crldp.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_crlentry.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_date.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_date.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_generalname.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_infoaccess.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_nameconstraints.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_ocsprequest.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_ocspresponse.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_publickey.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_x500name.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_ocspcertid.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixpki.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixpki.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_cert.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crl.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_date.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixpki.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixpki.a
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixpki.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/pki'
cd system; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/system'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_bigint.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_bytearray.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_common.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_common.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_error.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_error.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_hashtable.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_lifecycle.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_mem.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_mem.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_monitorlock.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_mutex.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_object.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_object.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_oid.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_oid.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_primhash.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_rwlock.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_string.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_string.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixsystem.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixsystem.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_common.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_error.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_mem.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_object.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_oid.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_string.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixsystem.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixsystem.a
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixsystem.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/system'
cd module; /usr/bin/make libs
make[6]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/module'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_aiamgr.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_colcertstore.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_httpcertstore.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_httpdefaultclient.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_ldaptemplates.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_ldapcertstore.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_ldapresponse.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_ldaprequest.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_ldapdefaultclient.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_nsscontext.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_pk11certstore.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_socket.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pkix_pl_socket.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixmodule.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixmodule.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_socket.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixmodule.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixmodule.a
../../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkixmodule.a /<<PKGBUILDDIR>>/dist/lib
make[6]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss/module'
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix/pkix_pl_nss'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/libpkix'
cd certdb; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/certdb'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/alg1485.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss alg1485.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdb.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss certdb.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certv3.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss certv3.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certxutl.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss certxutl.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crl.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss crl.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/genname.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss genname.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/stanpcertdb.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss stanpcertdb.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/polcyxtn.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss polcyxtn.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secname.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss secname.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xauthkid.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss xauthkid.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xbsconst.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss xbsconst.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xconst.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss xconst.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcertdb.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcertdb.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/alg1485.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdb.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certv3.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certxutl.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crl.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/genname.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/stanpcertdb.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/polcyxtn.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secname.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xauthkid.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xbsconst.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xconst.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcertdb.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcertdb.a
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcertdb.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/certdb'
cd certhigh; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/certhigh'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certhtml.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss certhtml.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certreq.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss certreq.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlv2.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss crlv2.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocsp.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss ocsp.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspsig.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss ocspsig.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certhigh.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss certhigh.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certvfy.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss certvfy.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certvfypkix.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss certvfypkix.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xcrldist.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss xcrldist.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcerthi.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcerthi.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certhtml.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certreq.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlv2.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocsp.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspsig.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certhigh.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certvfy.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certvfypkix.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xcrldist.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcerthi.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcerthi.a
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcerthi.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/certhigh'
cd pk11wrap; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pk11wrap'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dev3hack.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss dev3hack.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11akey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pk11akey.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11auth.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pk11auth.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11cert.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pk11cert.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11cxt.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pk11cxt.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11err.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pk11err.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11kea.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pk11kea.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11list.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pk11list.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11load.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pk11load.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11mech.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pk11mech.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11merge.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pk11merge.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11nobj.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pk11nobj.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11obj.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pk11obj.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pars.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pk11pars.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pbe.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pk11pbe.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pk12.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pk11pk12.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pqg.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pk11pqg.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11sdr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pk11sdr.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11skey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pk11skey.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11slot.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pk11slot.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11util.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pk11util.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpk11wrap.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpk11wrap.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dev3hack.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11akey.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11auth.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11cert.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11cxt.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11err.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11kea.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11list.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11load.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11mech.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11merge.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11nobj.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11obj.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pars.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pbe.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pk12.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pqg.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11sdr.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11skey.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11slot.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11util.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpk11wrap.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpk11wrap.a
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pk11wrap'
cd cryptohi; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/cryptohi'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sechash.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss sechash.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/seckey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss seckey.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secsign.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss secsign.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secvfy.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss secvfy.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dsautil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss dsautil.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcryptohi.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcryptohi.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sechash.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/seckey.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secsign.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secvfy.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dsautil.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcryptohi.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcryptohi.a
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcryptohi.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/cryptohi'
cd nss; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/nss'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssinit.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss nssinit.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssoptions.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss nssoptions.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssver.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss nssver.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilwrap.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss utilwrap.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssinit.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssoptions.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssver.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilwrap.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss.a
grep -v ';-' nss.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nss.def
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss3.so
gcc-4.7 -shared -Wl,-z,relro -Wl,-z,defs -Wl,-soname -Wl,libnss3.so -Wl,--version-script,Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nss.def -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss3.so Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssinit.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssoptions.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssver.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utilwrap.o ../certhigh/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certhtml.o ../certhigh/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certreq.o ../certhigh/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlv2.o ../certhigh/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocsp.o ../certhigh/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspsig.o ../certhigh/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certhigh.o ../certhigh/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certvfy.o ../certhigh/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certvfypkix.o ../certhigh/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xcrldist.o ../cryptohi/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sechash.o ../cryptohi/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/seckey.o ../cryptohi/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secsign.o ../cryptohi/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secvfy.o ../cryptohi/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dsautil.o ../pk11wrap/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dev3hack.o ../pk11wrap/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11akey.o ../pk11wrap/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11auth.o ../pk11wrap/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11cert.o ../pk11wrap/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11cxt.o ../pk11wrap/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11err.o ../pk11wrap/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11kea.o ../pk11wrap/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11list.o ../pk11wrap/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11load.o ../pk11wrap/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11mech.o ../pk11wrap/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11merge.o ../pk11wrap/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11nobj.o ../pk11wrap/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11obj.o ../pk11wrap/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pars.o ../pk11wrap/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pbe.o ../pk11wrap/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pk12.o ../pk11wrap/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11pqg.o ../pk11wrap/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11sdr.o ../pk11wrap/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11skey.o ../pk11wrap/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11slot.o ../pk11wrap/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11util.o ../certdb/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/alg1485.o ../certdb/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdb.o ../certdb/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certv3.o ../certdb/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certxutl.o ../certdb/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crl.o ../certdb/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/genname.o ../certdb/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/stanpcertdb.o ../certdb/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/polcyxtn.o ../certdb/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secname.o ../certdb/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xauthkid.o ../certdb/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xbsconst.o ../certdb/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/xconst.o ../pki/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/asymmkey.o ../pki/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certificate.o ../pki/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cryptocontext.o ../pki/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/symmkey.o ../pki/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/trustdomain.o ../pki/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tdcache.o ../pki/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdecode.o ../pki/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkistore.o ../pki/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkibase.o ../pki/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pki3hack.o ../dev/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devslot.o ../dev/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devtoken.o ../dev/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/devutil.o ../dev/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ckhelper.o ../base/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/arena.o ../base/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/error.o ../base/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/errorval.o ../base/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hashops.o ../base/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libc.o ../base/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tracker.o ../base/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/item.o ../base/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/utf8.o ../base/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/list.o ../base/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash.o ../libpkix/pkix/certsel/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_certselector.o ../libpkix/pkix/certsel/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o ../libpkix/pkix/checker/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o ../libpkix/pkix/checker/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o ../libpkix/pkix/checker/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_crlchecker.o ../libpkix/pkix/checker/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o ../libpkix/pkix/checker/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o ../libpkix/pkix/checker/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o ../libpkix/pkix/checker/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o ../libpkix/pkix/checker/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o ../libpkix/pkix/checker/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o ../libpkix/pkix/checker/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o ../libpkix/pkix/checker/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_policychecker.o ../libpkix/pkix/checker/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o ../libpkix/pkix/checker/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o ../libpkix/pkix/params/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_trustanchor.o ../libpkix/pkix/params/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_procparams.o ../libpkix/pkix/params/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_valparams.o ../libpkix/pkix/params/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o ../libpkix/pkix/results/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_buildresult.o ../libpkix/pkix/results/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_policynode.o ../libpkix/pkix/results/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_valresult.o ../libpkix/pkix/results/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_verifynode.o ../libpkix/pkix/top/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_validate.o ../libpkix/pkix/top/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_lifecycle.o ../libpkix/pkix/top/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_build.o ../libpkix/pkix/util/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_tools.o ../libpkix/pkix/util/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_error.o ../libpkix/pkix/util/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_logger.o ../libpkix/pkix/util/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_list.o ../libpkix/pkix/util/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_errpaths.o ../libpkix/pkix/crlsel/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_crlselector.o ../libpkix/pkix/crlsel/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o ../libpkix/pkix/store/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_store.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_cert.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crl.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_date.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o ../libpkix/pkix_pl_nss/pki/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o ../libpkix/pkix_pl_nss/system/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o ../libpkix/pkix_pl_nss/system/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o ../libpkix/pkix_pl_nss/system/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_common.o ../libpkix/pkix_pl_nss/system/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_error.o ../libpkix/pkix_pl_nss/system/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o ../libpkix/pkix_pl_nss/system/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o ../libpkix/pkix_pl_nss/system/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_mem.o ../libpkix/pkix_pl_nss/system/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o ../libpkix/pkix_pl_nss/system/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o ../libpkix/pkix_pl_nss/system/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_object.o ../libpkix/pkix_pl_nss/system/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_oid.o ../libpkix/pkix_pl_nss/system/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o ../libpkix/pkix_pl_nss/system/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o ../libpkix/pkix_pl_nss/system/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_string.o ../libpkix/pkix_pl_nss/module/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o ../libpkix/pkix_pl_nss/module/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o ../libpkix/pkix_pl_nss/module/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o ../libpkix/pkix_pl_nss/module/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o ../libpkix/pkix_pl_nss/module/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o ../libpkix/pkix_pl_nss/module/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o ../libpkix/pkix_pl_nss/module/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o ../libpkix/pkix_pl_nss/module/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o ../libpkix/pkix_pl_nss/module/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o ../libpkix/pkix_pl_nss/module/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix_pl_socket.o -L/<<PKGBUILDDIR>>/dist/lib -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
chmod +x Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss3.so
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss.a /<<PKGBUILDDIR>>/dist/lib
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnss3.so /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/nss'
cd ssl; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/ssl'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derive.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss derive.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dtlscon.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss dtlscon.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/prelib.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss prelib.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3con.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss ssl3con.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3gthr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss ssl3gthr.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslauth.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss sslauth.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslcon.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss sslcon.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssldef.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss ssldef.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslenum.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss sslenum.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslerr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss sslerr.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslerrstrs.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss sslerrstrs.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslinit.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss sslinit.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3ext.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss ssl3ext.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslmutex.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss sslmutex.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslnonce.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss sslnonce.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslreveal.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss sslreveal.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsecur.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss sslsecur.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsnce.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss sslsnce.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsock.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss sslsock.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssltrace.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss ssltrace.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslver.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss sslver.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/authcert.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss authcert.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmpcert.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss cmpcert.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslinfo.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss sslinfo.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3ecc.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss ssl3ecc.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls13con.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss tls13con.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls13hkdf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss tls13hkdf.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslcert.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss sslcert.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/unix_err.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_SSL_ENABLE_ZLIB -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss unix_err.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derive.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dtlscon.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/prelib.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3con.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslauth.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslcon.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssldef.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslenum.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslerr.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslinit.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3ext.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslmutex.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslnonce.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslreveal.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsecur.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsnce.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsock.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssltrace.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslver.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/authcert.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmpcert.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslinfo.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls13con.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls13hkdf.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslcert.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/unix_err.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl.a
grep -v ';-' ssl.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl.def
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl3.so
gcc-4.7 -shared -Wl,-z,relro -Wl,-z,defs -Wl,-soname -Wl,libssl3.so -Wl,--version-script,Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl.def -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl3.so Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derive.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dtlscon.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/prelib.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3con.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslauth.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslcon.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssldef.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslenum.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslerr.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslinit.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3ext.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslmutex.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslnonce.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslreveal.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsecur.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsnce.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslsock.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssltrace.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslver.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/authcert.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmpcert.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslinfo.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls13con.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls13hkdf.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sslcert.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/unix_err.o /<<PKGBUILDDIR>>/dist/lib/libfreebl.a -L/<<PKGBUILDDIR>>/dist/lib -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc -lz
chmod +x Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl3.so
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl.a /<<PKGBUILDDIR>>/dist/lib
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl3.so /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/ssl'
cd pkcs7; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pkcs7'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certread.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss certread.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7common.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss p7common.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7create.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss p7create.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7decode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss p7decode.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7encode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss p7encode.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7local.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss p7local.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secmime.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss secmime.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs7.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs7.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certread.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7common.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7create.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7decode.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7encode.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7local.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secmime.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs7.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs7.a
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs7.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pkcs7'
cd pkcs12; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/pkcs12'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12local.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss p12local.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12creat.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss p12creat.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12dec.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss p12dec.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12plcy.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss p12plcy.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12tmpl.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss p12tmpl.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12e.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss p12e.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12d.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss p12d.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs12.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs12.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12local.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12creat.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12dec.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12plcy.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12tmpl.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12e.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12d.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs12.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs12.a
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libpkcs12.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/pkcs12'
cd smime; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/smime'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsarray.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss cmsarray.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsasn1.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss cmsasn1.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsattr.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss cmsattr.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmscinfo.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss cmscinfo.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmscipher.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss cmscipher.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdecode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss cmsdecode.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdigdata.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss cmsdigdata.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdigest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss cmsdigest.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsencdata.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss cmsencdata.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsencode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss cmsencode.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsenvdata.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss cmsenvdata.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsmessage.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss cmsmessage.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmspubkey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss cmspubkey.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsrecinfo.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss cmsrecinfo.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsreclist.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss cmsreclist.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmssigdata.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss cmssigdata.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmssiginfo.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss cmssiginfo.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsudf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss cmsudf.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss cmsutil.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimemessage.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss smimemessage.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimeutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss smimeutil.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimever.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss smimever.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsarray.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsasn1.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsattr.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmscinfo.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmscipher.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdecode.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdigest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsencdata.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsencode.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsmessage.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmspubkey.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsreclist.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmssigdata.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsudf.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsutil.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimemessage.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimeutil.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimever.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime.a
grep -v ';-' smime.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smime.def
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime3.so
gcc-4.7 -shared -Wl,-z,relro -Wl,-z,defs -Wl,-soname -Wl,libsmime3.so -Wl,--version-script,Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smime.def -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime3.so Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsarray.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsasn1.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsattr.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmscinfo.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmscipher.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdecode.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsdigest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsencdata.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsencode.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsmessage.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmspubkey.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsreclist.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmssigdata.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsudf.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsutil.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimemessage.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimeutil.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/smimever.o ../pkcs12/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12local.o ../pkcs12/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12creat.o ../pkcs12/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12dec.o ../pkcs12/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12plcy.o ../pkcs12/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12tmpl.o ../pkcs12/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12e.o ../pkcs12/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p12d.o ../pkcs7/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certread.o ../pkcs7/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7common.o ../pkcs7/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7create.o ../pkcs7/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7decode.o ../pkcs7/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7encode.o ../pkcs7/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7local.o ../pkcs7/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secmime.o -L/<<PKGBUILDDIR>>/dist/lib -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
chmod +x Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime3.so
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime.a /<<PKGBUILDDIR>>/dist/lib
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsmime3.so /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/smime'
cd crmf; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/crmf'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfenc.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss crmfenc.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmftmpl.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss crmftmpl.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfreq.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss crmfreq.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfpop.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss crmfpop.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfdec.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss crmfdec.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfget.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss crmfget.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfcont.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss crmfcont.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfasn1.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss cmmfasn1.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfresp.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss cmmfresp.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfrec.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss cmmfrec.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfchal.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss cmmfchal.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/servget.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss servget.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/encutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss encutil.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/respcli.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss respcli.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/respcmn.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss respcmn.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/challcli.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss challcli.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/asn1cmn.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss asn1cmn.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcrmf.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcrmf.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfenc.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmftmpl.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfreq.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfpop.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfdec.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfget.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmfcont.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfasn1.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfresp.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfrec.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmmfchal.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/servget.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/encutil.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/respcli.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/respcmn.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/challcli.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/asn1cmn.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcrmf.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcrmf.a
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libcrmf.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/crmf'
cd jar; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/jar'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarver.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss jarver.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarsign.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss jarsign.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jar.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss jar.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jar-ds.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss jar-ds.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarfile.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss jarfile.c
jarfile.c: In function 'jar_listzip':
jarfile.c:805:19: warning: 'it' may be used uninitialized in this function [-Wmaybe-uninitialized]
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarint.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss jarint.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libjar.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libjar.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarver.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarsign.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jar.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jar-ds.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarfile.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/jarint.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libjar.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libjar.a
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libjar.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/jar'
cd ckfw; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/ckfw'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crypto.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr crypto.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/find.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr find.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr hash.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/instance.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr instance.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mutex.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr mutex.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/object.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr object.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/session.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr session.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sessobj.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr sessobj.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/slot.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr slot.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/token.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr token.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/wrap.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr wrap.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mechanism.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr mechanism.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckfw.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckfw.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crypto.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/find.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/hash.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/instance.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mutex.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/object.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/session.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sessobj.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/slot.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/token.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/wrap.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mechanism.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckfw.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckfw.a
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckfw.a /<<PKGBUILDDIR>>/dist/lib
cd builtins; /usr/bin/make libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/lib/ckfw/builtins'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/anchor.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I. anchor.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/constants.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I. constants.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bfind.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I. bfind.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/binst.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I. binst.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bobject.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I. bobject.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bsession.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I. bsession.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bslot.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I. bslot.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/btoken.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I. btoken.c
perl certdata.perl < certdata.txt > Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdata.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdata.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I. Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdata.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ckbiver.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I. ckbiver.c
grep -v ';-' nssckbi.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssckbi.def
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckbi.so
gcc-4.7 -shared -Wl,-z,relro -Wl,-z,defs -Wl,-soname -Wl,libnssckbi.so -Wl,--version-script,Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nssckbi.def -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckbi.so Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/anchor.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/constants.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bfind.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/binst.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bobject.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bsession.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bslot.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/btoken.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certdata.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ckbiver.o /<<PKGBUILDDIR>>/dist/lib/libnssckfw.a /<<PKGBUILDDIR>>/dist/lib/libnssb.a -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
chmod +x Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckbi.so
../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssckbi.so /<<PKGBUILDDIR>>/dist/lib
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/ckfw/builtins'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib/ckfw'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/lib'
cd cmd; /usr/bin/make libs
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd'
cd lib; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/lib'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/basicutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss basicutil.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss secutil.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secpwd.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss secpwd.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derprint.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss derprint.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/moreoids.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss moreoids.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pppolicy.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pppolicy.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ffs.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss ffs.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11table.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pk11table.c
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsectool.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsectool.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/basicutil.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secutil.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secpwd.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derprint.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/moreoids.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pppolicy.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ffs.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11table.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsectool.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsectool.a
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsectool.a /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/lib'
cd bltest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/bltest'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/blapitest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/softoken blapitest.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bltest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/softoken Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/blapitest.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsmime.a /<<PKGBUILDDIR>>/dist/lib/libssl.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libsectool.a /<<PKGBUILDDIR>>/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/dist/lib/libnssb.a /<<PKGBUILDDIR>>/dist/lib/libfreebl.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a -L/<<PKGBUILDDIR>>/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/bltest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/bltest'
cd fipstest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/fipstest'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss fipstest.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstest.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsmime.a /<<PKGBUILDDIR>>/dist/lib/libssl.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libsectool.a /<<PKGBUILDDIR>>/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/dist/lib/libnssb.a /<<PKGBUILDDIR>>/dist/lib/libfreebl.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a -L/<<PKGBUILDDIR>>/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/fipstest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/fipstest'
cd lowhashtest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/lowhashtest'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowhashtest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../nss/lib/freebl -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/softoken lowhashtest.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowhashtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../nss/lib/freebl -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/softoken Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowhashtest.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/<<PKGBUILDDIR>>/dist/lib -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -lfreebl3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lowhashtest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/lowhashtest'
cd shlibsign; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/shlibsign.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss shlibsign.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/shlibsign -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/shlibsign.o -Wl,-z,relro -Wl,-z,defs -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/shlibsign /<<PKGBUILDDIR>>/dist/bin
cd mangle; /usr/bin/make libs
make[5]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign/mangle'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mangle.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss mangle.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mangle -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mangle.o -Wl,-z,relro -Wl,-z,defs -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/mangle /<<PKGBUILDDIR>>/dist/bin
make[5]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign/mangle'
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/shlibsign'
cd addbuiltin; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/addbuiltin'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/addbuiltin.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd addbuiltin.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/addbuiltin -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/addbuiltin.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/addbuiltin /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/addbuiltin'
cd atob; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/atob'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/atob.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm atob.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/atob -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/atob.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/atob /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/atob'
cd btoa; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/btoa'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/btoa.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm btoa.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/btoa -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/btoa.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/btoa /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/btoa'
cd certcgi; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/certcgi'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certcgi.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm certcgi.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certcgi -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certcgi.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsmime.a /<<PKGBUILDDIR>>/dist/lib/libssl.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libsectool.a /<<PKGBUILDDIR>>/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/dist/lib/libnssb.a /<<PKGBUILDDIR>>/dist/lib/libfreebl.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a -L/<<PKGBUILDDIR>>/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certcgi /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/certcgi'
cd certutil; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/certutil'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certext.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd certext.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd certutil.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/keystuff.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd keystuff.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certutil -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certext.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certutil.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/keystuff.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certutil /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/certutil'
cd chktest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/chktest'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/chktest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm chktest.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/chktest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/chktest.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsmime.a /<<PKGBUILDDIR>>/dist/lib/libssl.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libsectool.a /<<PKGBUILDDIR>>/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/dist/lib/libnssb.a /<<PKGBUILDDIR>>/dist/lib/libfreebl.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a -L/<<PKGBUILDDIR>>/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/chktest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/chktest'
cd crlutil; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/crlutil'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlgen_lex.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm crlgen_lex.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlgen.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm crlgen.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm crlutil.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlutil -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlgen_lex.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlgen.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlutil.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crlutil /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/crlutil'
cd crmftest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/crmftest'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/testcrmf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss testcrmf.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmftest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/testcrmf.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libcrmf.a /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/crmftest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/crmftest'
cd dbtest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/dbtest'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dbtest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm dbtest.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dbtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dbtest.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dbtest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/dbtest'
cd derdump; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/derdump'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derdump.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm derdump.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derdump -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derdump.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/derdump /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/derdump'
cd digest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/digest'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/digest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm digest.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/digest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/digest.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/digest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/digest'
cd ecperf; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ecperf'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ecperf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd ecperf.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ecperf -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ecperf.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsmime.a /<<PKGBUILDDIR>>/dist/lib/libssl.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libsectool.a /<<PKGBUILDDIR>>/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/dist/lib/libnssb.a /<<PKGBUILDDIR>>/dist/lib/libfreebl.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a -L/<<PKGBUILDDIR>>/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ecperf /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ecperf'
cd ectest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ectest'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ectest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss ectest.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ectest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ectest.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsmime.a /<<PKGBUILDDIR>>/dist/lib/libssl.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libsectool.a /<<PKGBUILDDIR>>/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/dist/lib/libnssb.a /<<PKGBUILDDIR>>/dist/lib/libfreebl.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a -L/<<PKGBUILDDIR>>/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ectest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ectest'
cd httpserv; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/httpserv'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/httpserv.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm httpserv.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/httpserv -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/httpserv.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/httpserv /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/httpserv'
cd listsuites; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/listsuites'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/listsuites.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd listsuites.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/listsuites -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/listsuites.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/listsuites /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/listsuites'
cd makepqg; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/makepqg'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/makepqg.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm makepqg.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/makepqg -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/makepqg.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/makepqg /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/makepqg'
cd multinit; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/multinit'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/multinit.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss multinit.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/multinit -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/multinit.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/multinit /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/multinit'
cd ocspclnt; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ocspclnt'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspclnt.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd ocspclnt.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspclnt -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspclnt.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspclnt /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ocspclnt'
cd ocspresp; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ocspresp'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspresp.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd ocspresp.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspresp -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspresp.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ocspresp /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ocspresp'
cd oidcalc; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/oidcalc'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/oidcalc.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm oidcalc.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/oidcalc -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/oidcalc.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/oidcalc /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/oidcalc'
cd p7content; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7content'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7content.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd p7content.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7content -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7content.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7content /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7content'
cd p7env; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7env'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7env.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd p7env.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7env -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7env.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7env /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7env'
cd p7sign; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7sign'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7sign.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd p7sign.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7sign -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7sign.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7sign /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7sign'
cd p7verify; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/p7verify'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7verify.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd p7verify.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7verify -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7verify.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/p7verify /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/p7verify'
cd pk12util; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk12util'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk12util.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd pk12util.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk12util -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk12util.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk12util /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk12util'
cd pk11gcmtest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk11gcmtest'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11gcmtest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss pk11gcmtest.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11gcmtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11gcmtest.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11gcmtest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk11gcmtest'
cd pk11mode; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk11mode'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11mode.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd pk11mode.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11mode -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11mode.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11mode /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk11mode'
cd pk1sign; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pk1sign'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk1sign.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd pk1sign.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk1sign -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk1sign.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk1sign /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pk1sign'
cd pp; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pp'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pp.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm pp.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pp -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pp.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pp /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pp'
cd pwdecrypt; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pwdecrypt'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pwdecrypt.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd pwdecrypt.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pwdecrypt -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pwdecrypt.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pwdecrypt /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pwdecrypt'
cd rsaperf; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/rsaperf'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/rsaperf.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd rsaperf.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/defkey.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd defkey.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/rsaperf -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/rsaperf.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/defkey.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsmime.a /<<PKGBUILDDIR>>/dist/lib/libssl.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libsectool.a /<<PKGBUILDDIR>>/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/dist/lib/libnssb.a /<<PKGBUILDDIR>>/dist/lib/libfreebl.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a -L/<<PKGBUILDDIR>>/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/rsaperf /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/rsaperf'
cd sdrtest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/sdrtest'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sdrtest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd sdrtest.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sdrtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sdrtest.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sdrtest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/sdrtest'
cd selfserv; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/selfserv'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/selfserv.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm selfserv.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/selfserv -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/selfserv.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/selfserv /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/selfserv'
cd signtool; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/signtool'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signtool.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd signtool.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certgen.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd certgen.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/javascript.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd javascript.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/list.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd list.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sign.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd sign.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd util.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/verify.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd verify.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/zip.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd zip.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signtool -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signtool.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/certgen.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/javascript.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/list.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/sign.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/verify.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/zip.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libjar.a /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc -lz
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signtool /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/signtool'
cd signver; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/signver'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signver.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd signver.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk7print.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd pk7print.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signver -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signver.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk7print.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/signver /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/signver'
cd smimetools; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/smimetools'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm cmsutil.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsutil -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsutil.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/cmsutil /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/smimetools'
cd ssltap; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/ssltap'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssltap.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm ssltap.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssltap -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssltap.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssltap /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/ssltap'
cd strsclnt; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/strsclnt'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/strsclnt.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm strsclnt.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/strsclnt -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/strsclnt.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/strsclnt /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/strsclnt'
cd symkeyutil; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/symkeyutil'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/symkeyutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd symkeyutil.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/symkeyutil -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/public/seccmd Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/symkeyutil.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/symkeyutil /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/symkeyutil'
cd tests; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/tests'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/baddbdir.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm baddbdir.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/baddbdir -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/baddbdir.o \
-Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/conflict.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm conflict.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/conflict -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/conflict.o \
-Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dertimetest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm dertimetest.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dertimetest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dertimetest.o \
-Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/encodeinttest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm encodeinttest.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/encodeinttest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/encodeinttest.o \
-Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nonspr10.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm nonspr10.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nonspr10 -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nonspr10.o \
-Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/remtest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm remtest.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/remtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/remtest.o \
-Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secmodtest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm secmodtest.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secmodtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secmodtest.o \
-Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/baddbdir Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/conflict Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/dertimetest Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/encodeinttest Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nonspr10 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/remtest Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/secmodtest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/tests'
cd tstclnt; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/tstclnt'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tstclnt.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm tstclnt.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tstclnt -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tstclnt.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tstclnt /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/tstclnt'
cd vfychain; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/vfychain'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfychain.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd vfychain.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfychain -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfychain.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfychain /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/vfychain'
cd vfyserv; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/vfyserv'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfyserv.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm vfyserv.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfyutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm vfyutil.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfyserv -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/dbm Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfyserv.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfyutil.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/vfyserv /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/vfyserv'
cd modutil; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/modutil'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/modutil.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/sectools -I/<<PKGBUILDDIR>>/dist/private/sectools -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/seccmd -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/private/dbm modutil.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/sectools -I/<<PKGBUILDDIR>>/dist/private/sectools -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/seccmd -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/private/dbm pk11.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/instsec.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/sectools -I/<<PKGBUILDDIR>>/dist/private/sectools -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/seccmd -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/private/dbm instsec.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/install.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/sectools -I/<<PKGBUILDDIR>>/dist/private/sectools -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/seccmd -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/private/dbm install.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/installparse.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/sectools -I/<<PKGBUILDDIR>>/dist/private/sectools -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/seccmd -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/private/dbm installparse.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/install-ds.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/sectools -I/<<PKGBUILDDIR>>/dist/private/sectools -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/seccmd -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/private/dbm install-ds.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/sectools -I/<<PKGBUILDDIR>>/dist/private/sectools -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/seccmd -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/private/dbm lex.Pk11Install_yy.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/modutil -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/sectools -I/<<PKGBUILDDIR>>/dist/private/sectools -I/<<PKGBUILDDIR>>/dist/public/seccmd -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/dbm -I/<<PKGBUILDDIR>>/dist/private/seccmd -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/private/dbm Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/modutil.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/instsec.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/install.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/installparse.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/install-ds.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libjar.a /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc -lz
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/modutil /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/modutil'
cd pkix-errcodes; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/cmd/pkix-errcodes'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix-errcodes.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd pkix-errcodes.c
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix-errcodes -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/seccmd Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix-errcodes.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pkix-errcodes /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd/pkix-errcodes'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/cmd'
cd external_tests; /usr/bin/make libs
make[3]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests'
cd google_test; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/google_test'
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtest/src; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtest/src; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtest/src; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtest/src/gtest-all.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -Igtest/include/ -Igtest -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/gtest -I/<<PKGBUILDDIR>>/dist/private/gtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x gtest/src/gtest-all.cc
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest.a
ar cr Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest.a Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtest/src/gtest-all.o
echo Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest.a
Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest.a
rm -f Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest1.so
g++-4.7 -shared -Wl,-z,relro -Wl,-z,defs -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest1.so Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtest/src/gtest-all.o /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
chmod +x Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest1.so
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest.a /<<PKGBUILDDIR>>/dist/lib
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libgtest1.so /<<PKGBUILDDIR>>/dist/lib
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/google_test'
cd common; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/common'
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtests.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/gtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x gtests.cc
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtests -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/gtest Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtests.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libgtest.a /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtests /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/common'
cd der_gtest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/der_gtest'
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/der_getint_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x der_getint_unittest.cc
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/der_gtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/der_getint_unittest.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libgtest.a ../common/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtests.o /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/der_gtest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/der_gtest'
cd util_gtest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/util_gtest'
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util_utf8_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/gtest -I../../lib/util -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x util_utf8_unittest.cc
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util_b64_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/gtest -I../../lib/util -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x util_b64_unittest.cc
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util_gtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/gtest -I../../lib/util Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util_utf8_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util_b64_unittest.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libgtest.a /<<PKGBUILDDIR>>/dist/lib/libnssutil.a ../common/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtests.o /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/util_gtest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/util_gtest'
cd pk11_gtest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/pk11_gtest'
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_aeskeywrap_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x pk11_aeskeywrap_unittest.cc
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_chacha20poly1305_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x pk11_chacha20poly1305_unittest.cc
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_pbkdf2_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x pk11_pbkdf2_unittest.cc
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_prf_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x pk11_prf_unittest.cc
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_rsapss_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x pk11_rsapss_unittest.cc
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_gtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_aeskeywrap_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_chacha20poly1305_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_pbkdf2_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_prf_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_rsapss_unittest.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libgtest.a ../common/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/gtests.o /<<PKGBUILDDIR>>/dist/lib/libsectool.a -L/<<PKGBUILDDIR>>/dist/lib -lssl3 -lsmime3 -lnss3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/pk11_gtest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/pk11_gtest'
cd ssl_gtest; /usr/bin/make libs
make[4]: Entering directory `/<<PKGBUILDDIR>>/nss/external_tests/ssl_gtest'
gcc-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl_internals.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest -I../../lib/ssl libssl_internals.c
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_0rtt_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_0rtt_unittest.cc
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_agent_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_agent_unittest.cc
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_auth_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_auth_unittest.cc
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_ciphersuite_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_ciphersuite_unittest.cc
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_dhe_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_dhe_unittest.cc
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_drop_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_drop_unittest.cc
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_ems_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_ems_unittest.cc
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_extension_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_extension_unittest.cc
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_gtest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_gtest.cc
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_loopback_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_loopback_unittest.cc
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_resumption_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_resumption_unittest.cc
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_skip_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_skip_unittest.cc
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_staticrsa_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_staticrsa_unittest.cc
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_v2_client_hello_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_v2_client_hello_unittest.cc
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_version_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x ssl_version_unittest.cc
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/test_io.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x test_io.cc
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_agent.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x tls_agent.cc
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_connect.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x tls_connect.cc
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_hkdf_unittest.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x tls_hkdf_unittest.cc
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_filter.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x tls_filter.cc
if test ! -d Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; then rm -rf Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; ../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -D Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ; fi
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_parser.o -c -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest -I../../lib/ssl -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -std=c++0x tls_parser.cc
g++-4.7 -o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_gtest -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -Wall -pipe -D_FORTIFY_SOURCE=2 -fPIC -DLINUX2_1 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -DNSS_NO_GCC48 -DXP_UNIX -UDEBUG -DNDEBUG -D_REENTRANT -DNSS_NO_INIT_SUPPORT -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../external_tests/google_test/gtest/include -I../../external_tests/common -I/usr/include/nspr -I/<<PKGBUILDDIR>>/dist/include -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/private/nss -I/<<PKGBUILDDIR>>/dist/public/nspr -I/<<PKGBUILDDIR>>/dist/public/nss -I/<<PKGBUILDDIR>>/dist/public/libdbm -I/<<PKGBUILDDIR>>/dist/public/gtest -I../../lib/ssl Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libssl_internals.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_agent_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_auth_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_ciphersuite_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_dhe_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_drop_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_ems_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_extension_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_gtest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_loopback_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_resumption_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_skip_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_staticrsa_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_v2_client_hello_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_version_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/test_io.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_agent.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_connect.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_hkdf_unittest.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_filter.o Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/tls_parser.o -Wl,-z,relro -Wl,-z,defs /<<PKGBUILDDIR>>/dist/lib/libgtest.a /<<PKGBUILDDIR>>/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/dist/lib/libsmime.a /<<PKGBUILDDIR>>/dist/lib/libssl.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libsectool.a /<<PKGBUILDDIR>>/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/dist/lib/libnssb.a /<<PKGBUILDDIR>>/dist/lib/libfreebl.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/dist/lib/libcerthi.a -L/<<PKGBUILDDIR>>/dist/lib -lsqlite3 -L/<<PKGBUILDDIR>>/dist/lib -lnssutil3 -L/usr/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc -lz
../../coreconf/nsinstall/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/ssl_gtest /<<PKGBUILDDIR>>/dist/bin
make[4]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests/ssl_gtest'
make[3]: Leaving directory `/<<PKGBUILDDIR>>/nss/external_tests'
make[2]: Leaving directory `/<<PKGBUILDDIR>>/nss'
make[1]: Leaving directory `/<<PKGBUILDDIR>>'
debian/rules override_dh_auto_test
make[1]: Entering directory `/<<PKGBUILDDIR>>'
# Create .chk files for FIPS mode tests
cd /<<PKGBUILDDIR>>/dist/lib; LD_LIBRARY_PATH=/<<PKGBUILDDIR>>/dist/lib /<<PKGBUILDDIR>>/dist/bin/shlibsign -v -i libsoftokn3.so
Library File: ../../nss/lib/softoken/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn3.so 1004927 bytes
Check File: ../../nss/lib/softoken/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libsoftokn3.chk
Link: libsoftokn3.chk
hash: 32 bytes
90 c0 92 3b d7 38 0f 67 54 14
cc 39 41 28 92 49 c4 d3 35 72
7d 94 06 14 e9 d9 c2 18 3f 29
4b ac
signature: 64 bytes
0a 18 03 3d 1c ba e6 53 f4 72
91 9d ce 43 cb a2 ab 7b 43 c9
ac 35 93 8c 09 04 db 6a 6e 74
d1 04 51 1c 67 dc 11 49 d8 43
db b3 7f 19 8c fc 42 6d ba b5
d3 57 97 d4 59 bd 0c 10 d9 b3
36 0a 12 04
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ...
cd /<<PKGBUILDDIR>>/dist/lib; LD_LIBRARY_PATH=/<<PKGBUILDDIR>>/dist/lib /<<PKGBUILDDIR>>/dist/bin/shlibsign -v -i libfreebl3.so
Library File: ../../nss/lib/freebl/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so 44007 bytes
Check File: ../../nss/lib/freebl/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.chk
Link: libfreebl3.chk
hash: 32 bytes
69 18 c9 68 e7 f9 27 93 ac 91
5e 76 e1 1f 29 20 f7 7c 54 73
cf a2 23 f8 f1 02 f1 b5 eb b8
e9 cd
signature: 64 bytes
8d fa fa 70 d3 d8 46 cd 79 d9
c7 3e da 4c f3 fa 14 ae df 73
82 d0 09 4e 04 bd fa 82 b3 14
d8 75 2f 39 96 07 a5 4e 92 f2
73 df 7f 94 20 b7 32 9a dd 51
37 f7 9a 73 54 2e 5d 26 60 a2
5f b2 b5 b4
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ...
cd /<<PKGBUILDDIR>>/dist/lib; LD_LIBRARY_PATH=/<<PKGBUILDDIR>>/dist/lib /<<PKGBUILDDIR>>/dist/bin/shlibsign -v -i libfreeblpriv3.so
Library File: ../../nss/lib/freebl/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreeblpriv3.so 1449570 bytes
Check File: ../../nss/lib/freebl/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreeblpriv3.chk
Link: libfreeblpriv3.chk
hash: 32 bytes
4c eb 82 13 85 82 42 92 24 02
28 74 7a 9a 46 95 d3 f0 68 87
c2 28 b5 fd 39 d3 6c f6 ed de
1d cc
signature: 64 bytes
77 a8 c4 e0 a4 27 dc c6 dc 43
28 43 5a 7b 45 32 02 42 db 2b
45 4c 3d 73 b6 c9 b0 03 ac 37
42 70 1c 38 74 49 b2 9f 10 be
d7 b6 44 dc d1 d7 1a 34 73 67
48 5a 3d 75 89 1c cf aa 7c 78
0c ff 50 f3
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ...
cd /<<PKGBUILDDIR>>/dist/lib; LD_LIBRARY_PATH=/<<PKGBUILDDIR>>/dist/lib /<<PKGBUILDDIR>>/dist/bin/shlibsign -v -i libnssdbm3.so
Library File: ../../nss/lib/softoken/legacydb/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm3.so 754611 bytes
Check File: ../../nss/lib/softoken/legacydb/Linux4.8_arm_gcc-4.7_glibc_PTH_OPT.OBJ/libnssdbm3.chk
Link: libnssdbm3.chk
hash: 32 bytes
1b de 22 e7 9d f1 ef e8 17 33
08 38 c4 68 5c 49 e1 d2 1f b9
6a b6 12 eb 1a 9c c3 0d 9f c9
e5 44
signature: 64 bytes
32 a9 ae ee 6b 5d b3 d1 e9 5b
d3 08 47 02 4f cb 91 30 e1 62
9a cc 07 9b a4 b8 c4 2d 7a 78
39 9c 4d a3 43 d7 6f 0c 2a 4b
da 80 c1 ce 0f 40 08 6a b3 58
d6 c8 8b 98 63 07 29 e9 1b 23
0c de 05 b7
moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB
Generate a DSA key pair ...
# Run tests
export DIST=/<<PKGBUILDDIR>> &&\
export OBJDIR=dist &&\
export IP_ADDRESS=127.0.0.1 &&\
export USE_IP=TRUE &&\
export NSS_CYCLES=standard &&\
cd /<<PKGBUILDDIR>>/nss/tests && ./all.sh
../../coreconf/Werror.mk:90: Unable to find gcc 4.8 or greater, disabling -Werror
../../coreconf/Werror.mk:90: Unable to find gcc 4.8 or greater, disabling -Werror
../../coreconf/Werror.mk:90: Unable to find gcc 4.8 or greater, disabling -Werror
testdir is /<<PKGBUILDDIR>>/tests_results/security
init.sh init: Creating /<<PKGBUILDDIR>>/tests_results/security
********************************************
Platform: dist
Results: testwandboard.1
********************************************
init.sh init: Testing PATH .:/<<PKGBUILDDIR>>/dist/bin:/<<PKGBUILDDIR>>/dist/lib:/bin:/usr/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/sbin:/usr/games against LIB /<<PKGBUILDDIR>>/dist/lib:
Running tests for cipher
TIMESTAMP cipher BEGIN: Wed May 31 22:54:52 UTC 2017
cipher.sh: Cipher Tests ===============================
cipher.sh: DES ECB Encrypt --------------------------------
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des_ecb passed.
bltest -T -m des_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des_ecb passed.
cipher.sh: #1: DES ECB Encrypt - PASSED
cipher.sh: DES ECB Decrypt --------------------------------
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des_ecb passed.
bltest -T -m des_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des_ecb passed.
cipher.sh: #2: DES ECB Decrypt - PASSED
cipher.sh: DES CBC Encrypt --------------------------------
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des_cbc passed.
bltest -T -m des_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des_cbc passed.
cipher.sh: #3: DES CBC Encrypt - PASSED
cipher.sh: DES CBC Decrypt --------------------------------
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des_cbc passed.
bltest -T -m des_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des_cbc passed.
cipher.sh: #4: DES CBC Decrypt - PASSED
cipher.sh: DES3 ECB Encrypt --------------------------------
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des3_ecb passed.
cipher.sh: #5: DES3 ECB Encrypt - PASSED
cipher.sh: DES3 ECB Decrypt --------------------------------
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des3_ecb passed.
bltest -T -m des3_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des3_ecb passed.
cipher.sh: #6: DES3 ECB Decrypt - PASSED
cipher.sh: DES3 CBC Encrypt --------------------------------
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for des3_cbc passed.
cipher.sh: #7: DES3 CBC Encrypt - PASSED
cipher.sh: DES3 CBC Decrypt --------------------------------
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for des3_cbc passed.
bltest -T -m des3_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for des3_cbc passed.
cipher.sh: #8: DES3 CBC Decrypt - PASSED
cipher.sh: AES ECB Encrypt --------------------------------
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
Encryption self-test for aes_ecb passed.
cipher.sh: #9: AES ECB Encrypt - PASSED
cipher.sh: AES ECB Decrypt --------------------------------
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
bltest -T -m aes_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
Decryption self-test for aes_ecb passed.
cipher.sh: #10: AES ECB Decrypt - PASSED
cipher.sh: AES CBC Encrypt --------------------------------
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
Encryption self-test for aes_cbc passed.
cipher.sh: #11: AES CBC Encrypt - PASSED
cipher.sh: AES CBC Decrypt --------------------------------
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
bltest -T -m aes_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
Decryption self-test for aes_cbc passed.
cipher.sh: #12: AES CBC Decrypt - PASSED
cipher.sh: AES CTR --------------------------------
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
bltest -T -m aes_ctr -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
Encryption self-test for aes_ctr passed.
Decryption self-test for aes_ctr passed.
cipher.sh: #13: AES CTR - PASSED
cipher.sh: AES CTS --------------------------------
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
bltest -T -m aes_cts -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
Encryption self-test for aes_cts passed.
Decryption self-test for aes_cts passed.
cipher.sh: #14: AES CTS - PASSED
cipher.sh: AES GCM --------------------------------
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
bltest -T -m aes_gcm -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
Encryption self-test for aes_gcm passed.
Decryption self-test for aes_gcm passed.
cipher.sh: #15: AES GCM - PASSED
cipher.sh: Camellia ECB Encrypt --------------------------------
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
Encryption self-test for camellia_ecb passed.
cipher.sh: #16: Camellia ECB Encrypt - PASSED
cipher.sh: Camellia ECB Decrypt --------------------------------
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
bltest -T -m camellia_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
Decryption self-test for camellia_ecb passed.
cipher.sh: #17: Camellia ECB Decrypt - PASSED
cipher.sh: Camellia CBC Encrypt --------------------------------
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
Encryption self-test for camellia_cbc passed.
cipher.sh: #18: Camellia CBC Encrypt - PASSED
cipher.sh: Camellia CBC Decrypt --------------------------------
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
bltest -T -m camellia_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
Decryption self-test for camellia_cbc passed.
cipher.sh: #19: Camellia CBC Decrypt - PASSED
cipher.sh: SEED ECB Encrypt --------------------------------
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for seed_ecb passed.
cipher.sh: #20: SEED ECB Encrypt - PASSED
cipher.sh: SEED ECB Decrypt --------------------------------
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for seed_ecb passed.
bltest -T -m seed_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for seed_ecb passed.
cipher.sh: #21: SEED ECB Decrypt - PASSED
cipher.sh: SEED CBC Encrypt --------------------------------
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for seed_cbc passed.
cipher.sh: #22: SEED CBC Encrypt - PASSED
cipher.sh: SEED CBC Decrypt --------------------------------
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for seed_cbc passed.
bltest -T -m seed_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for seed_cbc passed.
cipher.sh: #23: SEED CBC Decrypt - PASSED
cipher.sh: ChaCha20 Poly1305 Encrypt --------------------------------
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for chacha20_poly1305 passed.
Encryption self-test for chacha20_poly1305 passed.
cipher.sh: #24: ChaCha20 Poly1305 Encrypt - PASSED
cipher.sh: ChaCha20 Poly1305 Decrypt --------------------------------
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
bltest -T -m chacha20_poly1305 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for chacha20_poly1305 passed.
Decryption self-test for chacha20_poly1305 passed.
cipher.sh: #25: ChaCha20 Poly1305 Decrypt - PASSED
cipher.sh: RC2 ECB Encrypt --------------------------------
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rc2_ecb passed.
cipher.sh: #26: RC2 ECB Encrypt - PASSED
cipher.sh: RC2 ECB Decrypt --------------------------------
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rc2_ecb passed.
bltest -T -m rc2_ecb -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rc2_ecb passed.
cipher.sh: #27: RC2 ECB Decrypt - PASSED
cipher.sh: RC2 CBC Encrypt --------------------------------
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rc2_cbc passed.
cipher.sh: #28: RC2 CBC Encrypt - PASSED
cipher.sh: RC2 CBC Decrypt --------------------------------
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rc2_cbc passed.
bltest -T -m rc2_cbc -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rc2_cbc passed.
cipher.sh: #29: RC2 CBC Decrypt - PASSED
cipher.sh: RC4 Encrypt --------------------------------
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
bltest -T -m rc4 -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rc4 passed.
Encryption self-test for rc4 passed.
cipher.sh: #30: RC4 Encrypt - PASSED
cipher.sh: RC4 Decrypt --------------------------------
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
bltest -T -m rc4 -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rc4 passed.
Decryption self-test for rc4 passed.
cipher.sh: #31: RC4 Decrypt - PASSED
cipher.sh: RSA Encrypt --------------------------------
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rsa passed.
bltest -T -m rsa -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rsa passed.
cipher.sh: #32: RSA Encrypt - PASSED
cipher.sh: RSA Decrypt --------------------------------
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rsa passed.
bltest -T -m rsa -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rsa passed.
cipher.sh: #33: RSA Decrypt - PASSED
cipher.sh: RSA EncryptOAEP --------------------------------
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -E -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
Encryption self-test for rsa_oaep passed.
cipher.sh: #34: RSA EncryptOAEP - PASSED
cipher.sh: RSA DecryptOAEP --------------------------------
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
bltest -T -m rsa_oaep -D -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
Decryption self-test for rsa_oaep passed.
cipher.sh: #35: RSA DecryptOAEP - PASSED
cipher.sh: RSA SignPSS --------------------------------
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
bltest -T -m rsa_pss -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
Signature self-test for rsa_pss passed.
cipher.sh: #36: RSA SignPSS - PASSED
cipher.sh: RSA CheckSignPSS --------------------------------
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
bltest -T -m rsa_pss -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
Verification self-test for rsa_pss passed.
cipher.sh: #37: RSA CheckSignPSS - PASSED
cipher.sh: DSA Sign --------------------------------
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
bltest -T -m dsa -S -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
Signature self-test for dsa passed.
cipher.sh: #38: DSA Sign - PASSED
cipher.sh: DSA Verify --------------------------------
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
bltest -T -m dsa -V -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
Verification self-test for dsa passed.
cipher.sh: #39: DSA Verify - PASSED
cipher.sh: MD2 Hash --------------------------------
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for md2 passed.
bltest -T -m md2 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for md2 passed.
cipher.sh: #40: MD2 Hash - PASSED
cipher.sh: MD5 Hash --------------------------------
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for md5 passed.
bltest -T -m md5 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for md5 passed.
cipher.sh: #41: MD5 Hash - PASSED
cipher.sh: SHA1 Hash --------------------------------
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha1 passed.
bltest -T -m sha1 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha1 passed.
cipher.sh: #42: SHA1 Hash - PASSED
cipher.sh: SHA224 Hash --------------------------------
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
bltest -T -m sha224 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha224 passed.
Hash self-test for sha224 passed.
cipher.sh: #43: SHA224 Hash - PASSED
cipher.sh: SHA256 Hash --------------------------------
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
bltest -T -m sha256 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha256 passed.
Hash self-test for sha256 passed.
cipher.sh: #44: SHA256 Hash - PASSED
cipher.sh: SHA384 Hash --------------------------------
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
bltest -T -m sha384 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha384 passed.
Hash self-test for sha384 passed.
cipher.sh: #45: SHA384 Hash - PASSED
cipher.sh: SHA512 Hash --------------------------------
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 0 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 1 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 2 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 3 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 4 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 5 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 6 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 0
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 1
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 2
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 3
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 4
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 5
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 6
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
bltest -T -m sha512 -H -d /<<PKGBUILDDIR>>/nss/tests/../cmd/bltest -1 7 -2 7
Hash self-test for sha512 passed.
Hash self-test for sha512 passed.
cipher.sh: #46: SHA512 Hash - PASSED
cipher.sh: NIST AES128 GCM Decrypt --------------------------------
pk11gcmtest aes kat gcm /<<PKGBUILDDIR>>/nss/tests/../cmd/pk11gcmtest/tests/gcmDecrypt128.rsp
Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
46 test groups
PASS
cipher.sh: #47: NIST AES128 GCM Decrypt - PASSED
cipher.sh: NIST AES192 GCM Decrypt --------------------------------
pk11gcmtest aes kat gcm /<<PKGBUILDDIR>>/nss/tests/../cmd/pk11gcmtest/tests/gcmDecrypt192.rsp
Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
46 test groups
PASS
cipher.sh: #48: NIST AES192 GCM Decrypt - PASSED
cipher.sh: NIST AES256 GCM Decrypt --------------------------------
pk11gcmtest aes kat gcm /<<PKGBUILDDIR>>/nss/tests/../cmd/pk11gcmtest/tests/gcmDecrypt256.rsp
Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
46 test groups
PASS
cipher.sh: #49: NIST AES256 GCM Decrypt - PASSED
cipher.sh: NIST AES128 GCM Encrypt --------------------------------
pk11gcmtest aes kat gcm /<<PKGBUILDDIR>>/nss/tests/../cmd/pk11gcmtest/tests/gcmEncryptExtIV128.rsp
Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 128, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
46 test groups
PASS
cipher.sh: #50: NIST AES128 GCM Encrypt - PASSED
cipher.sh: NIST AES192 GCM Encrypt --------------------------------
pk11gcmtest aes kat gcm /<<PKGBUILDDIR>>/nss/tests/../cmd/pk11gcmtest/tests/gcmEncryptExtIV192.rsp
Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 192, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
46 test groups
PASS
cipher.sh: #51: NIST AES192 GCM Encrypt - PASSED
cipher.sh: NIST AES256 GCM Encrypt --------------------------------
pk11gcmtest aes kat gcm /<<PKGBUILDDIR>>/nss/tests/../cmd/pk11gcmtest/tests/gcmEncryptExtIV256.rsp
Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 96, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 0, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 128, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 104, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 256, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 8, PTlen = 408, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 0, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 128, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 104, AADlen = 720, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 256, AADlen = 160, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 0, Taglen = 96: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 128: 2 tests
Keylen = 256, IVlen = 1024, PTlen = 408, AADlen = 720, Taglen = 96: 2 tests
46 test groups
PASS
cipher.sh: #52: NIST AES256 GCM Encrypt - PASSED
TIMESTAMP cipher END: Wed May 31 22:59:55 UTC 2017
Running tests for lowhash
TIMESTAMP lowhash BEGIN: Wed May 31 22:59:55 UTC 2017
lowhash.sh: Lowhash Tests - /proc/sys/crypto/fips_enabled is 0 ===============================
lowhashtest with fips mode=0
lowhashtest MD5
lowhash.sh: #53: lowhashtest with fips mode=0 for MD5 - PASSED
lowhashtest SHA1
lowhash.sh: #54: lowhashtest with fips mode=0 for SHA1 - PASSED
lowhashtest SHA224
lowhash.sh: #55: lowhashtest with fips mode=0 for SHA224 - PASSED
lowhashtest SHA256
lowhash.sh: #56: lowhashtest with fips mode=0 for SHA256 - PASSED
lowhashtest SHA384
lowhash.sh: #57: lowhashtest with fips mode=0 for SHA384 - PASSED
lowhashtest SHA512
lowhash.sh: #58: lowhashtest with fips mode=0 for SHA512 - PASSED
lowhashtest with fips mode=1
lowhashtest MD5
lowhash.sh: #59: lowhashtest with fips mode=1 for MD5 - PASSED
lowhashtest SHA1
lowhash.sh: #60: lowhashtest with fips mode=1 for SHA1 - PASSED
lowhashtest SHA224
lowhash.sh: #61: lowhashtest with fips mode=1 for SHA224 - PASSED
lowhashtest SHA256
lowhash.sh: #62: lowhashtest with fips mode=1 for SHA256 - PASSED
lowhashtest SHA384
lowhash.sh: #63: lowhashtest with fips mode=1 for SHA384 - PASSED
lowhashtest SHA512
lowhash.sh: #64: lowhashtest with fips mode=1 for SHA512 - PASSED
lowhash.sh done
TIMESTAMP lowhash END: Wed May 31 22:59:59 UTC 2017
Running tests for libpkix
TIMESTAMP libpkix BEGIN: Wed May 31 22:59:59 UTC 2017
TIMESTAMP libpkix END: Wed May 31 22:59:59 UTC 2017
Running tests for cert
TIMESTAMP cert BEGIN: Wed May 31 22:59:59 UTC 2017
cert.sh: Certutil and Crlutil Tests with ECC ===============================
cert.sh: #65: Looking for root certs module. - PASSED
cert.sh: Creating a CA Certificate TestCA ==========================
/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/CA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/CA -f ../tests.pw
cert.sh: #66: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/CA
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #67: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert TestCA --------------------------
certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #68: Creating CA Cert TestCA - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n TestCA -r -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/CA -o root.cert
cert.sh: #69: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate serverCA ==========================
/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA -f ../tests.pw
cert.sh: #70: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #71: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert serverCA --------------------------
certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #72: Creating CA Cert serverCA - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n serverCA -r -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA -o root.cert
cert.sh: #73: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-1-serverCA ==========================
/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA
cert.sh: Creating CA Cert chain-1-serverCA --------------------------
certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #74: Creating CA Cert chain-1-serverCA - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-1-serverCA -r -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA -o root.cert
cert.sh: #75: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-2-serverCA ==========================
/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA
cert.sh: Creating CA Cert chain-2-serverCA --------------------------
certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #76: Creating CA Cert chain-2-serverCA - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-2-serverCA -r -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA -o root.cert
cert.sh: #77: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate clientCA ==========================
/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA
cert.sh: Creating CA Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA -f ../tests.pw
cert.sh: #78: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #79: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert clientCA --------------------------
certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #80: Creating CA Cert clientCA - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n clientCA -r -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA -o root.cert
cert.sh: #81: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-1-clientCA ==========================
/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA
cert.sh: Creating CA Cert chain-1-clientCA --------------------------
certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #82: Creating CA Cert chain-1-clientCA - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-1-clientCA -r -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA -o root.cert
cert.sh: #83: Exporting Root Cert - PASSED
cert.sh: Creating a CA Certificate chain-2-clientCA ==========================
/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA
cert.sh: Creating CA Cert chain-2-clientCA --------------------------
certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #84: Creating CA Cert chain-2-clientCA - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n chain-2-clientCA -r -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA -o root.cert
cert.sh: #85: Exporting Root Cert - PASSED
cert.sh: Creating an DSA CA Certificate TestCA-dsa ==========================
/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/CA
cert.sh: Creating DSA CA Cert TestCA-dsa --------------------------
certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #86: Creating DSA CA Cert TestCA-dsa - PASSED
cert.sh: Exporting DSA Root Cert --------------------------
certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert
cert.sh: #87: Exporting DSA Root Cert - PASSED
cert.sh: Creating an DSA CA Certificate serverCA-dsa ==========================
/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA
cert.sh: Creating DSA CA Cert serverCA-dsa --------------------------
certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #88: Creating DSA CA Cert serverCA-dsa - PASSED
cert.sh: Exporting DSA Root Cert --------------------------
certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert
cert.sh: #89: Exporting DSA Root Cert - PASSED
cert.sh: Creating an DSA CA Certificate chain-1-serverCA-dsa ==========================
/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA
cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa --------------------------
certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #90: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED
cert.sh: Exporting DSA Root Cert --------------------------
certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert
cert.sh: #91: Exporting DSA Root Cert - PASSED
cert.sh: Creating an DSA CA Certificate chain-2-serverCA-dsa ==========================
/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA
cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa --------------------------
certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #92: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED
cert.sh: Exporting DSA Root Cert --------------------------
certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert
cert.sh: #93: Exporting DSA Root Cert - PASSED
cert.sh: Creating an DSA CA Certificate clientCA-dsa ==========================
/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA
cert.sh: Creating DSA CA Cert clientCA-dsa --------------------------
certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #94: Creating DSA CA Cert clientCA-dsa - PASSED
cert.sh: Exporting DSA Root Cert --------------------------
certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert
cert.sh: #95: Exporting DSA Root Cert - PASSED
cert.sh: Creating an DSA CA Certificate chain-1-clientCA-dsa ==========================
/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA
cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa --------------------------
certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #96: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED
cert.sh: Exporting DSA Root Cert --------------------------
certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert
cert.sh: #97: Exporting DSA Root Cert - PASSED
cert.sh: Creating an DSA CA Certificate chain-2-clientCA-dsa ==========================
/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA
cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa --------------------------
certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #98: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED
cert.sh: Exporting DSA Root Cert --------------------------
certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert
cert.sh: #99: Exporting DSA Root Cert - PASSED
cert.sh: Creating an EC CA Certificate TestCA-ec ==========================
/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/CA
cert.sh: Creating EC CA Cert TestCA-ec --------------------------
certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #100: Creating EC CA Cert TestCA-ec - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n TestCA-ec -r -d . -o ecroot.cert
cert.sh: #101: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate serverCA-ec ==========================
/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA
cert.sh: Creating EC CA Cert serverCA-ec --------------------------
certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #102: Creating EC CA Cert serverCA-ec - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n serverCA-ec -r -d . -o ecroot.cert
cert.sh: #103: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ==========================
/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA
cert.sh: Creating EC CA Cert chain-1-serverCA-ec --------------------------
certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #104: Creating EC CA Cert chain-1-serverCA-ec - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert
cert.sh: #105: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ==========================
/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA
cert.sh: Creating EC CA Cert chain-2-serverCA-ec --------------------------
certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #106: Creating EC CA Cert chain-2-serverCA-ec - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert
cert.sh: #107: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate clientCA-ec ==========================
/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA
cert.sh: Creating EC CA Cert clientCA-ec --------------------------
certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #108: Creating EC CA Cert clientCA-ec - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n clientCA-ec -r -d . -o ecroot.cert
cert.sh: #109: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ==========================
/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA
cert.sh: Creating EC CA Cert chain-1-clientCA-ec --------------------------
certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #110: Creating EC CA Cert chain-1-clientCA-ec - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert
cert.sh: #111: Exporting EC Root Cert - PASSED
cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ==========================
/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA
cert.sh: Creating EC CA Cert chain-2-clientCA-ec --------------------------
certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #112: Creating EC CA Cert chain-2-clientCA-ec - PASSED
cert.sh: Exporting EC Root Cert --------------------------
certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert
cert.sh: #113: Exporting EC Root Cert - PASSED
cert.sh: Creating Certificates, issued by the last ===============
of a chain of CA's which are not in the same database============
Server Cert
cert.sh: Initializing 127.0.0.1's Cert DB (ext.) --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_server -f ../tests.pw
cert.sh: #114: Initializing 127.0.0.1's Cert DB (ext.) - PASSED
cert.sh: Loading root cert module to 127.0.0.1's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_server
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #115: Loading root cert module to 127.0.0.1's Cert DB (ext.) - PASSED
cert.sh: Generate Cert Request for 127.0.0.1 (ext) --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_server -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #116: Generate Cert Request for 127.0.0.1 (ext) - PASSED
cert.sh: Sign 127.0.0.1's Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 200 -v 60 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA -i req -o 127.0.0.1.cert -f ../tests.pw
cert.sh: #117: Sign 127.0.0.1's Request (ext) - PASSED
cert.sh: Import 127.0.0.1's Cert -t u,u,u (ext) --------------------------
certutil -A -n 127.0.0.1 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_server -f ../tests.pw -i 127.0.0.1.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #118: Import 127.0.0.1's Cert -t u,u,u (ext) - PASSED
cert.sh: Import Client Root CA -t T,, for 127.0.0.1 (ext.) --------------------------
certutil -A -n clientCA -t T,, -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA/clientCA.ca.cert
cert.sh: #119: Import Client Root CA -t T,, for 127.0.0.1 (ext.) - PASSED
cert.sh: Generate DSA Cert Request for 127.0.0.1 (ext) --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #120: Generate DSA Cert Request for 127.0.0.1 (ext) - PASSED
cert.sh: Sign 127.0.0.1's DSA Request (ext) --------------------------
certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA -i req -o 127.0.0.1-dsa.cert -f ../tests.pw
cert.sh: #121: Sign 127.0.0.1's DSA Request (ext) - PASSED
cert.sh: Import 127.0.0.1's DSA Cert -t u,u,u (ext) --------------------------
certutil -A -n 127.0.0.1-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_server -f ../tests.pw -i 127.0.0.1-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #122: Import 127.0.0.1's DSA Cert -t u,u,u (ext) - PASSED
cert.sh: Import Client DSA Root CA -t T,, for 127.0.0.1 (ext.) --------------------------
certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA/clientCA-dsa.ca.cert
cert.sh: #123: Import Client DSA Root CA -t T,, for 127.0.0.1 (ext.) - PASSED
cert.sh: Generate mixed DSA Cert Request for 127.0.0.1 (ext) --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #124: Generate mixed DSA Cert Request for 127.0.0.1 (ext) - PASSED
cert.sh: Sign 127.0.0.1's mixed DSA Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 202 -v 60 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA -i req -o 127.0.0.1-dsamixed.cert -f ../tests.pw
cert.sh: #125: Sign 127.0.0.1's mixed DSA Request (ext) - PASSED
cert.sh: Import 127.0.0.1's mixed DSA Cert -t u,u,u (ext) --------------------------
certutil -A -n 127.0.0.1-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_server -f ../tests.pw -i 127.0.0.1-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #126: Import 127.0.0.1's mixed DSA Cert -t u,u,u (ext) - PASSED
cert.sh: Generate EC Cert Request for 127.0.0.1 (ext) --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #127: Generate EC Cert Request for 127.0.0.1 (ext) - PASSED
cert.sh: Sign 127.0.0.1's EC Request (ext) --------------------------
certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA -i req -o 127.0.0.1-ec.cert -f ../tests.pw
cert.sh: #128: Sign 127.0.0.1's EC Request (ext) - PASSED
cert.sh: Import 127.0.0.1's EC Cert -t u,u,u (ext) --------------------------
certutil -A -n 127.0.0.1-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_server -f ../tests.pw -i 127.0.0.1-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #129: Import 127.0.0.1's EC Cert -t u,u,u (ext) - PASSED
cert.sh: Import Client EC Root CA -t T,, for 127.0.0.1 (ext.) --------------------------
certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA/clientCA-ec.ca.cert
cert.sh: #130: Import Client EC Root CA -t T,, for 127.0.0.1 (ext.) - PASSED
cert.sh: Generate mixed EC Cert Request for 127.0.0.1 (ext) --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #131: Generate mixed EC Cert Request for 127.0.0.1 (ext) - PASSED
cert.sh: Sign 127.0.0.1's mixed EC Request (ext) --------------------------
certutil -C -c chain-2-serverCA -m 201 -v 60 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA -i req -o 127.0.0.1-ecmixed.cert -f ../tests.pw
cert.sh: #132: Sign 127.0.0.1's mixed EC Request (ext) - PASSED
cert.sh: Import 127.0.0.1's mixed EC Cert -t u,u,u (ext) --------------------------
certutil -A -n 127.0.0.1-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_server -f ../tests.pw -i 127.0.0.1-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #133: Import 127.0.0.1's mixed EC Cert -t u,u,u (ext) - PASSED
Importing all the server's own CA chain into the servers DB
cert.sh: Import serverCA CA -t C,C,C for 127.0.0.1 (ext.) --------------------------
certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA/serverCA.ca.cert
cert.sh: #134: Import serverCA CA -t C,C,C for 127.0.0.1 (ext.) - PASSED
cert.sh: Import chain-1-serverCA CA -t u,u,u for 127.0.0.1 (ext.) --------------------------
certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA/chain-1-serverCA.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #135: Import chain-1-serverCA CA -t u,u,u for 127.0.0.1 (ext.) - PASSED
cert.sh: Import chain-2-serverCA CA -t u,u,u for 127.0.0.1 (ext.) --------------------------
certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA/chain-2-serverCA.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #136: Import chain-2-serverCA CA -t u,u,u for 127.0.0.1 (ext.) - PASSED
cert.sh: Import serverCA-dsa CA -t C,C,C for 127.0.0.1 (ext.) --------------------------
certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA/serverCA-dsa.ca.cert
cert.sh: #137: Import serverCA-dsa CA -t C,C,C for 127.0.0.1 (ext.) - PASSED
cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for 127.0.0.1 (ext.) --------------------------
certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA/chain-1-serverCA-dsa.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #138: Import chain-1-serverCA-dsa CA -t u,u,u for 127.0.0.1 (ext.) - PASSED
cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for 127.0.0.1 (ext.) --------------------------
certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA/chain-2-serverCA-dsa.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #139: Import chain-2-serverCA-dsa CA -t u,u,u for 127.0.0.1 (ext.) - PASSED
cert.sh: Import serverCA-ec CA -t C,C,C for 127.0.0.1 (ext.) --------------------------
certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA/serverCA-ec.ca.cert
cert.sh: #140: Import serverCA-ec CA -t C,C,C for 127.0.0.1 (ext.) - PASSED
cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for 127.0.0.1 (ext.) --------------------------
certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA/chain-1-serverCA-ec.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #141: Import chain-1-serverCA-ec CA -t u,u,u for 127.0.0.1 (ext.) - PASSED
cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for 127.0.0.1 (ext.) --------------------------
certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_server -i /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA/chain-2-serverCA-ec.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #142: Import chain-2-serverCA-ec CA -t u,u,u for 127.0.0.1 (ext.) - PASSED
Client Cert
cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_client -f ../tests.pw
cert.sh: #143: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED
cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_client
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #144: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED
cert.sh: Generate Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #145: Generate Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 300 -v 60 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw
cert.sh: #146: Sign ExtendedSSLUser's Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_client -f ../tests.pw -i ExtendedSSLUser.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #147: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA/serverCA.ca.cert
cert.sh: #148: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #149: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's DSA Request (ext) --------------------------
certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw
cert.sh: #150: Sign ExtendedSSLUser's DSA Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #151: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA/serverCA-dsa.ca.cert
cert.sh: #152: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #153: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 302 -v 60 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw
cert.sh: #154: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #155: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED
cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #156: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's EC Request (ext) --------------------------
certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw
cert.sh: #157: Sign ExtendedSSLUser's EC Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #158: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED
cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA/serverCA-ec.ca.cert
cert.sh: #159: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) --------------------------
certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #160: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED
cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) --------------------------
certutil -C -c chain-2-clientCA -m 301 -v 60 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw
cert.sh: #161: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED
cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) --------------------------
certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #162: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED
Importing all the client's own CA chain into the servers DB
cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA/clientCA.ca.cert
cert.sh: #163: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA/chain-1-clientCA.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #164: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA/chain-2-clientCA.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #165: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA/clientCA-dsa.ca.cert
cert.sh: #166: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA/chain-1-clientCA-dsa.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #167: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA/chain-2-clientCA-dsa.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #168: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) --------------------------
certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA/clientCA-ec.ca.cert
cert.sh: #169: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA/chain-1-clientCA-ec.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #170: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) --------------------------
certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_client -i /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/clientCA/chain-2-clientCA-ec.ca.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #171: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED
cert.sh SUCCESS: EXT passed
cert.sh: Creating Client CA Issued Certificates ===============
cert.sh: Initializing TestUser's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw
cert.sh: #172: Initializing TestUser's Cert DB - PASSED
cert.sh: Loading root cert module to TestUser's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #173: Loading root cert module to TestUser's Cert DB - PASSED
cert.sh: Import Root CA for TestUser --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -i ../CA/TestCA.ca.cert
cert.sh: #174: Import Root CA for TestUser - PASSED
cert.sh: Import DSA Root CA for TestUser --------------------------
certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -i ../CA/TestCA-dsa.ca.cert
cert.sh: #175: Import DSA Root CA for TestUser - PASSED
cert.sh: Import EC Root CA for TestUser --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -i ../CA/TestCA-ec.ca.cert
cert.sh: #176: Import EC Root CA for TestUser - PASSED
cert.sh: Generate Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #177: Generate Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's Request --------------------------
certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw
cert.sh: #178: Sign TestUser's Request - PASSED
cert.sh: Import TestUser's Cert --------------------------
certutil -A -n TestUser -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #179: Import TestUser's Cert - PASSED
cert.sh SUCCESS: TestUser's Cert Created
cert.sh: Generate DSA Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #180: Generate DSA Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw
cert.sh: #181: Sign TestUser's DSA Request - PASSED
cert.sh: Import TestUser's DSA Cert --------------------------
certutil -A -n TestUser-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #182: Import TestUser's DSA Cert - PASSED
cert.sh SUCCESS: TestUser's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #183: Generate mixed DSA Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw
cert.sh: #184: Sign TestUser's DSA Request with RSA - PASSED
cert.sh: Import TestUser's mixed DSA Cert --------------------------
certutil -A -n TestUser-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #185: Import TestUser's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #186: Generate EC Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's EC Request --------------------------
certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw
cert.sh: #187: Sign TestUser's EC Request - PASSED
cert.sh: Import TestUser's EC Cert --------------------------
certutil -A -n TestUser-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #188: Import TestUser's EC Cert - PASSED
cert.sh SUCCESS: TestUser's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser --------------------------
certutil -s "CN=TestUser, E=TestUser-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #189: Generate mixed EC Cert Request for TestUser - PASSED
cert.sh: Sign TestUser's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw
cert.sh: #190: Sign TestUser's EC Request with RSA - PASSED
cert.sh: Import TestUser's mixed EC Cert --------------------------
certutil -A -n TestUser-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #191: Import TestUser's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser's mixed EC Cert Created
cert.sh: Creating Server CA Issued Certificate for \
127.0.0.1 ------------------------------------
cert.sh: Initializing 127.0.0.1's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server -f ../tests.pw
cert.sh: #192: Initializing 127.0.0.1's Cert DB - PASSED
cert.sh: Loading root cert module to 127.0.0.1's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #193: Loading root cert module to 127.0.0.1's Cert DB - PASSED
cert.sh: Import Root CA for 127.0.0.1 --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server -i ../CA/TestCA.ca.cert
cert.sh: #194: Import Root CA for 127.0.0.1 - PASSED
cert.sh: Import DSA Root CA for 127.0.0.1 --------------------------
certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server -i ../CA/TestCA-dsa.ca.cert
cert.sh: #195: Import DSA Root CA for 127.0.0.1 - PASSED
cert.sh: Import EC Root CA for 127.0.0.1 --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server -i ../CA/TestCA-ec.ca.cert
cert.sh: #196: Import EC Root CA for 127.0.0.1 - PASSED
cert.sh: Generate Cert Request for 127.0.0.1 --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #197: Generate Cert Request for 127.0.0.1 - PASSED
cert.sh: Sign 127.0.0.1's Request --------------------------
certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o 127.0.0.1.cert -f ../tests.pw
cert.sh: #198: Sign 127.0.0.1's Request - PASSED
cert.sh: Import 127.0.0.1's Cert --------------------------
certutil -A -n 127.0.0.1 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server -f ../tests.pw -i 127.0.0.1.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #199: Import 127.0.0.1's Cert - PASSED
cert.sh SUCCESS: 127.0.0.1's Cert Created
cert.sh: Generate DSA Cert Request for 127.0.0.1 --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #200: Generate DSA Cert Request for 127.0.0.1 - PASSED
cert.sh: Sign 127.0.0.1's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o 127.0.0.1-dsa.cert -f ../tests.pw
cert.sh: #201: Sign 127.0.0.1's DSA Request - PASSED
cert.sh: Import 127.0.0.1's DSA Cert --------------------------
certutil -A -n 127.0.0.1-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server -f ../tests.pw -i 127.0.0.1-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #202: Import 127.0.0.1's DSA Cert - PASSED
cert.sh SUCCESS: 127.0.0.1's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for 127.0.0.1 --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #203: Generate mixed DSA Cert Request for 127.0.0.1 - PASSED
cert.sh: Sign 127.0.0.1's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o 127.0.0.1-dsamixed.cert -f ../tests.pw
cert.sh: #204: Sign 127.0.0.1's DSA Request with RSA - PASSED
cert.sh: Import 127.0.0.1's mixed DSA Cert --------------------------
certutil -A -n 127.0.0.1-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server -f ../tests.pw -i 127.0.0.1-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #205: Import 127.0.0.1's mixed DSA Cert - PASSED
cert.sh SUCCESS: 127.0.0.1's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for 127.0.0.1 --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #206: Generate EC Cert Request for 127.0.0.1 - PASSED
cert.sh: Sign 127.0.0.1's EC Request --------------------------
certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o 127.0.0.1-ec.cert -f ../tests.pw
cert.sh: #207: Sign 127.0.0.1's EC Request - PASSED
cert.sh: Import 127.0.0.1's EC Cert --------------------------
certutil -A -n 127.0.0.1-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server -f ../tests.pw -i 127.0.0.1-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #208: Import 127.0.0.1's EC Cert - PASSED
cert.sh SUCCESS: 127.0.0.1's EC Cert Created
cert.sh: Generate mixed EC Cert Request for 127.0.0.1 --------------------------
certutil -s "CN=127.0.0.1, E=127.0.0.1-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #209: Generate mixed EC Cert Request for 127.0.0.1 - PASSED
cert.sh: Sign 127.0.0.1's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o 127.0.0.1-ecmixed.cert -f ../tests.pw
cert.sh: #210: Sign 127.0.0.1's EC Request with RSA - PASSED
cert.sh: Import 127.0.0.1's mixed EC Cert --------------------------
certutil -A -n 127.0.0.1-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server -f ../tests.pw -i 127.0.0.1-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #211: Import 127.0.0.1's mixed EC Cert - PASSED
cert.sh SUCCESS: 127.0.0.1's mixed EC Cert Created
cert.sh: Creating Server CA Issued Certificate for \
127.0.0.1-sni --------------------------------
cert.sh: Generate Cert Request for testwandboard-sni.(none) --------------------------
certutil -s "CN=testwandboard-sni.(none), E=testwandboard-sni.(none)@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #212: Generate Cert Request for testwandboard-sni.(none) - PASSED
cert.sh: Sign testwandboard-sni.(none)'s Request --------------------------
certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o testwandboard-sni.(none).cert -f ../tests.pw
cert.sh: #213: Sign testwandboard-sni.(none)'s Request - PASSED
cert.sh: Import testwandboard-sni.(none)'s Cert --------------------------
certutil -A -n testwandboard-sni.(none) -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server -f ../tests.pw -i testwandboard-sni.(none).cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #214: Import testwandboard-sni.(none)'s Cert - PASSED
cert.sh SUCCESS: testwandboard-sni.(none)'s Cert Created
cert.sh: Generate DSA Cert Request for testwandboard-sni.(none) --------------------------
certutil -s "CN=testwandboard-sni.(none), E=testwandboard-sni.(none)-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #215: Generate DSA Cert Request for testwandboard-sni.(none) - PASSED
cert.sh: Sign testwandboard-sni.(none)'s DSA Request --------------------------
certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o testwandboard-sni.(none)-dsa.cert -f ../tests.pw
cert.sh: #216: Sign testwandboard-sni.(none)'s DSA Request - PASSED
cert.sh: Import testwandboard-sni.(none)'s DSA Cert --------------------------
certutil -A -n testwandboard-sni.(none)-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server -f ../tests.pw -i testwandboard-sni.(none)-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #217: Import testwandboard-sni.(none)'s DSA Cert - PASSED
cert.sh SUCCESS: testwandboard-sni.(none)'s DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for testwandboard-sni.(none) --------------------------
certutil -s "CN=testwandboard-sni.(none), E=testwandboard-sni.(none)-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #218: Generate mixed DSA Cert Request for testwandboard-sni.(none) - PASSED
cert.sh: Sign testwandboard-sni.(none)'s DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o testwandboard-sni.(none)-dsamixed.cert -f ../tests.pw
cert.sh: #219: Sign testwandboard-sni.(none)'s DSA Request with RSA - PASSED
cert.sh: Import testwandboard-sni.(none)'s mixed DSA Cert --------------------------
certutil -A -n testwandboard-sni.(none)-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server -f ../tests.pw -i testwandboard-sni.(none)-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #220: Import testwandboard-sni.(none)'s mixed DSA Cert - PASSED
cert.sh SUCCESS: testwandboard-sni.(none)'s mixed DSA Cert Created
cert.sh: Generate EC Cert Request for testwandboard-sni.(none) --------------------------
certutil -s "CN=testwandboard-sni.(none), E=testwandboard-sni.(none)-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #221: Generate EC Cert Request for testwandboard-sni.(none) - PASSED
cert.sh: Sign testwandboard-sni.(none)'s EC Request --------------------------
certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o testwandboard-sni.(none)-ec.cert -f ../tests.pw
cert.sh: #222: Sign testwandboard-sni.(none)'s EC Request - PASSED
cert.sh: Import testwandboard-sni.(none)'s EC Cert --------------------------
certutil -A -n testwandboard-sni.(none)-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server -f ../tests.pw -i testwandboard-sni.(none)-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #223: Import testwandboard-sni.(none)'s EC Cert - PASSED
cert.sh SUCCESS: testwandboard-sni.(none)'s EC Cert Created
cert.sh: Generate mixed EC Cert Request for testwandboard-sni.(none) --------------------------
certutil -s "CN=testwandboard-sni.(none), E=testwandboard-sni.(none)-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #224: Generate mixed EC Cert Request for testwandboard-sni.(none) - PASSED
cert.sh: Sign testwandboard-sni.(none)'s EC Request with RSA --------------------------
certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o testwandboard-sni.(none)-ecmixed.cert -f ../tests.pw
cert.sh: #225: Sign testwandboard-sni.(none)'s EC Request with RSA - PASSED
cert.sh: Import testwandboard-sni.(none)'s mixed EC Cert --------------------------
certutil -A -n testwandboard-sni.(none)-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server -f ../tests.pw -i testwandboard-sni.(none)-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #226: Import testwandboard-sni.(none)'s mixed EC Cert - PASSED
cert.sh SUCCESS: testwandboard-sni.(none)'s mixed EC Cert Created
cert.sh: Modify trust attributes of Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA -t TC,TC,TC -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server -f ../tests.pw
cert.sh: #227: Modify trust attributes of Root CA -t TC,TC,TC - PASSED
cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA-dsa -t TC,TC,TC -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server -f ../tests.pw
cert.sh: #228: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED
cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC --------------------------
certutil -M -n TestCA-ec -t TC,TC,TC -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server -f ../tests.pw
cert.sh: #229: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED
cert.sh SUCCESS: SSL passed
cert.sh: Creating database for OCSP stapling tests ===============
cp -r /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/stapling
Modify trust attributes of EC Root CA -t TC,TC,TC --------------------------
pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA
pk12util: PKCS12 EXPORT SUCCESSFUL
Modify trust attributes of EC Root CA -t TC,TC,TC --------------------------
pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling
pk12util: PKCS12 IMPORT SUCCESSFUL
cert.sh: Creating Client CA Issued Certificates ==============
cert.sh: Initializing Alice's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/alicedir -f ../tests.pw
cert.sh: #230: Initializing Alice's Cert DB - PASSED
cert.sh: Loading root cert module to Alice's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/alicedir
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #231: Loading root cert module to Alice's Cert DB - PASSED
cert.sh: Import Root CA for Alice --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/alicedir -i ../CA/TestCA.ca.cert
cert.sh: #232: Import Root CA for Alice - PASSED
cert.sh: Import DSA Root CA for Alice --------------------------
certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/alicedir -i ../CA/TestCA-dsa.ca.cert
cert.sh: #233: Import DSA Root CA for Alice - PASSED
cert.sh: Import EC Root CA for Alice --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/alicedir -i ../CA/TestCA-ec.ca.cert
cert.sh: #234: Import EC Root CA for Alice - PASSED
cert.sh: Generate Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/alicedir -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #235: Generate Cert Request for Alice - PASSED
cert.sh: Sign Alice's Request --------------------------
certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw
cert.sh: #236: Sign Alice's Request - PASSED
cert.sh: Import Alice's Cert --------------------------
certutil -A -n Alice -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/alicedir -f ../tests.pw -i Alice.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #237: Import Alice's Cert - PASSED
cert.sh SUCCESS: Alice's Cert Created
cert.sh: Generate DSA Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/alicedir -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #238: Generate DSA Cert Request for Alice - PASSED
cert.sh: Sign Alice's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw
cert.sh: #239: Sign Alice's DSA Request - PASSED
cert.sh: Import Alice's DSA Cert --------------------------
certutil -A -n Alice-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/alicedir -f ../tests.pw -i Alice-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #240: Import Alice's DSA Cert - PASSED
cert.sh SUCCESS: Alice's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/alicedir -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #241: Generate mixed DSA Cert Request for Alice - PASSED
cert.sh: Sign Alice's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw
cert.sh: #242: Sign Alice's DSA Request with RSA - PASSED
cert.sh: Import Alice's mixed DSA Cert --------------------------
certutil -A -n Alice-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/alicedir -f ../tests.pw -i Alice-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #243: Import Alice's mixed DSA Cert - PASSED
cert.sh SUCCESS: Alice's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/alicedir -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #244: Generate EC Cert Request for Alice - PASSED
cert.sh: Sign Alice's EC Request --------------------------
certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw
cert.sh: #245: Sign Alice's EC Request - PASSED
cert.sh: Import Alice's EC Cert --------------------------
certutil -A -n Alice-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/alicedir -f ../tests.pw -i Alice-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #246: Import Alice's EC Cert - PASSED
cert.sh SUCCESS: Alice's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Alice --------------------------
certutil -s "CN=Alice, E=Alice-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/alicedir -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #247: Generate mixed EC Cert Request for Alice - PASSED
cert.sh: Sign Alice's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw
cert.sh: #248: Sign Alice's EC Request with RSA - PASSED
cert.sh: Import Alice's mixed EC Cert --------------------------
certutil -A -n Alice-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/alicedir -f ../tests.pw -i Alice-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #249: Import Alice's mixed EC Cert - PASSED
cert.sh SUCCESS: Alice's mixed EC Cert Created
cert.sh: Initializing Bob's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/bobdir -f ../tests.pw
cert.sh: #250: Initializing Bob's Cert DB - PASSED
cert.sh: Loading root cert module to Bob's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/bobdir
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #251: Loading root cert module to Bob's Cert DB - PASSED
cert.sh: Import Root CA for Bob --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/bobdir -i ../CA/TestCA.ca.cert
cert.sh: #252: Import Root CA for Bob - PASSED
cert.sh: Import DSA Root CA for Bob --------------------------
certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/bobdir -i ../CA/TestCA-dsa.ca.cert
cert.sh: #253: Import DSA Root CA for Bob - PASSED
cert.sh: Import EC Root CA for Bob --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/bobdir -i ../CA/TestCA-ec.ca.cert
cert.sh: #254: Import EC Root CA for Bob - PASSED
cert.sh: Generate Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/bobdir -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #255: Generate Cert Request for Bob - PASSED
cert.sh: Sign Bob's Request --------------------------
certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw
cert.sh: #256: Sign Bob's Request - PASSED
cert.sh: Import Bob's Cert --------------------------
certutil -A -n Bob -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/bobdir -f ../tests.pw -i Bob.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #257: Import Bob's Cert - PASSED
cert.sh SUCCESS: Bob's Cert Created
cert.sh: Generate DSA Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/bobdir -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #258: Generate DSA Cert Request for Bob - PASSED
cert.sh: Sign Bob's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw
cert.sh: #259: Sign Bob's DSA Request - PASSED
cert.sh: Import Bob's DSA Cert --------------------------
certutil -A -n Bob-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/bobdir -f ../tests.pw -i Bob-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #260: Import Bob's DSA Cert - PASSED
cert.sh SUCCESS: Bob's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/bobdir -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #261: Generate mixed DSA Cert Request for Bob - PASSED
cert.sh: Sign Bob's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw
cert.sh: #262: Sign Bob's DSA Request with RSA - PASSED
cert.sh: Import Bob's mixed DSA Cert --------------------------
certutil -A -n Bob-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/bobdir -f ../tests.pw -i Bob-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #263: Import Bob's mixed DSA Cert - PASSED
cert.sh SUCCESS: Bob's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/bobdir -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #264: Generate EC Cert Request for Bob - PASSED
cert.sh: Sign Bob's EC Request --------------------------
certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw
cert.sh: #265: Sign Bob's EC Request - PASSED
cert.sh: Import Bob's EC Cert --------------------------
certutil -A -n Bob-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/bobdir -f ../tests.pw -i Bob-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #266: Import Bob's EC Cert - PASSED
cert.sh SUCCESS: Bob's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Bob --------------------------
certutil -s "CN=Bob, E=Bob-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/bobdir -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #267: Generate mixed EC Cert Request for Bob - PASSED
cert.sh: Sign Bob's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw
cert.sh: #268: Sign Bob's EC Request with RSA - PASSED
cert.sh: Import Bob's mixed EC Cert --------------------------
certutil -A -n Bob-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/bobdir -f ../tests.pw -i Bob-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #269: Import Bob's mixed EC Cert - PASSED
cert.sh SUCCESS: Bob's mixed EC Cert Created
cert.sh: Creating Dave's Certificate -------------------------
cert.sh: Initializing Dave's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/dave -f ../tests.pw
cert.sh: #270: Initializing Dave's Cert DB - PASSED
cert.sh: Loading root cert module to Dave's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/dave
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #271: Loading root cert module to Dave's Cert DB - PASSED
cert.sh: Import Root CA for Dave --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/dave -i ../CA/TestCA.ca.cert
cert.sh: #272: Import Root CA for Dave - PASSED
cert.sh: Import DSA Root CA for Dave --------------------------
certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/dave -i ../CA/TestCA-dsa.ca.cert
cert.sh: #273: Import DSA Root CA for Dave - PASSED
cert.sh: Import EC Root CA for Dave --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/dave -i ../CA/TestCA-ec.ca.cert
cert.sh: #274: Import EC Root CA for Dave - PASSED
cert.sh: Generate Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/dave -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #275: Generate Cert Request for Dave - PASSED
cert.sh: Sign Dave's Request --------------------------
certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw
cert.sh: #276: Sign Dave's Request - PASSED
cert.sh: Import Dave's Cert --------------------------
certutil -A -n Dave -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/dave -f ../tests.pw -i Dave.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #277: Import Dave's Cert - PASSED
cert.sh SUCCESS: Dave's Cert Created
cert.sh: Generate DSA Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/dave -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #278: Generate DSA Cert Request for Dave - PASSED
cert.sh: Sign Dave's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw
cert.sh: #279: Sign Dave's DSA Request - PASSED
cert.sh: Import Dave's DSA Cert --------------------------
certutil -A -n Dave-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/dave -f ../tests.pw -i Dave-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #280: Import Dave's DSA Cert - PASSED
cert.sh SUCCESS: Dave's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/dave -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #281: Generate mixed DSA Cert Request for Dave - PASSED
cert.sh: Sign Dave's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw
cert.sh: #282: Sign Dave's DSA Request with RSA - PASSED
cert.sh: Import Dave's mixed DSA Cert --------------------------
certutil -A -n Dave-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/dave -f ../tests.pw -i Dave-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #283: Import Dave's mixed DSA Cert - PASSED
cert.sh SUCCESS: Dave's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/dave -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #284: Generate EC Cert Request for Dave - PASSED
cert.sh: Sign Dave's EC Request --------------------------
certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw
cert.sh: #285: Sign Dave's EC Request - PASSED
cert.sh: Import Dave's EC Cert --------------------------
certutil -A -n Dave-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/dave -f ../tests.pw -i Dave-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #286: Import Dave's EC Cert - PASSED
cert.sh SUCCESS: Dave's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Dave --------------------------
certutil -s "CN=Dave, E=Dave-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/dave -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #287: Generate mixed EC Cert Request for Dave - PASSED
cert.sh: Sign Dave's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw
cert.sh: #288: Sign Dave's EC Request with RSA - PASSED
cert.sh: Import Dave's mixed EC Cert --------------------------
certutil -A -n Dave-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/dave -f ../tests.pw -i Dave-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #289: Import Dave's mixed EC Cert - PASSED
cert.sh SUCCESS: Dave's mixed EC Cert Created
cert.sh: Creating multiEmail's Certificate --------------------
cert.sh: Initializing Eve's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/eve -f ../tests.pw
cert.sh: #290: Initializing Eve's Cert DB - PASSED
cert.sh: Loading root cert module to Eve's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/eve
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #291: Loading root cert module to Eve's Cert DB - PASSED
cert.sh: Import Root CA for Eve --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/eve -i ../CA/TestCA.ca.cert
cert.sh: #292: Import Root CA for Eve - PASSED
cert.sh: Import DSA Root CA for Eve --------------------------
certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/eve -i ../CA/TestCA-dsa.ca.cert
cert.sh: #293: Import DSA Root CA for Eve - PASSED
cert.sh: Import EC Root CA for Eve --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/eve -i ../CA/TestCA-ec.ca.cert
cert.sh: #294: Import EC Root CA for Eve - PASSED
cert.sh: Generate Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/eve -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #295: Generate Cert Request for Eve - PASSED
cert.sh: Sign Eve's Request --------------------------
certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #296: Sign Eve's Request - PASSED
cert.sh: Import Eve's Cert --------------------------
certutil -A -n Eve -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/eve -f ../tests.pw -i Eve.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #297: Import Eve's Cert - PASSED
cert.sh SUCCESS: Eve's Cert Created
cert.sh: Generate DSA Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/eve -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #298: Generate DSA Cert Request for Eve - PASSED
cert.sh: Sign Eve's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #299: Sign Eve's DSA Request - PASSED
cert.sh: Import Eve's DSA Cert --------------------------
certutil -A -n Eve-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/eve -f ../tests.pw -i Eve-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #300: Import Eve's DSA Cert - PASSED
cert.sh SUCCESS: Eve's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/eve -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #301: Generate mixed DSA Cert Request for Eve - PASSED
cert.sh: Sign Eve's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #302: Sign Eve's DSA Request with RSA - PASSED
cert.sh: Import Eve's mixed DSA Cert --------------------------
certutil -A -n Eve-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/eve -f ../tests.pw -i Eve-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #303: Import Eve's mixed DSA Cert - PASSED
cert.sh SUCCESS: Eve's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/eve -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #304: Generate EC Cert Request for Eve - PASSED
cert.sh: Sign Eve's EC Request --------------------------
certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #305: Sign Eve's EC Request - PASSED
cert.sh: Import Eve's EC Cert --------------------------
certutil -A -n Eve-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/eve -f ../tests.pw -i Eve-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #306: Import Eve's EC Cert - PASSED
cert.sh SUCCESS: Eve's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Eve --------------------------
certutil -s "CN=Eve, E=Eve-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/eve -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #307: Generate mixed EC Cert Request for Eve - PASSED
cert.sh: Sign Eve's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@bogus.net,eve@bogus.cc,beve@bogus.com
cert.sh: #308: Sign Eve's EC Request with RSA - PASSED
cert.sh: Import Eve's mixed EC Cert --------------------------
certutil -A -n Eve-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/eve -f ../tests.pw -i Eve-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #309: Import Eve's mixed EC Cert - PASSED
cert.sh SUCCESS: Eve's mixed EC Cert Created
cert.sh: Importing Certificates ==============================
cert.sh: Import Bob's cert into Alice's db --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert
cert.sh: #310: Import Bob's cert into Alice's db - PASSED
cert.sh: Import Dave's cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert
cert.sh: #311: Import Dave's cert into Alice's DB - PASSED
cert.sh: Import Dave's cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert
cert.sh: #312: Import Dave's cert into Bob's DB - PASSED
cert.sh: Import Eve's cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert
cert.sh: #313: Import Eve's cert into Alice's DB - PASSED
cert.sh: Import Eve's cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert
cert.sh: #314: Import Eve's cert into Bob's DB - PASSED
cert.sh: Importing EC Certificates ==============================
cert.sh: Import Bob's EC cert into Alice's db --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert
cert.sh: #315: Import Bob's EC cert into Alice's db - PASSED
cert.sh: Import Dave's EC cert into Alice's DB --------------------------
certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert
cert.sh: #316: Import Dave's EC cert into Alice's DB - PASSED
cert.sh: Import Dave's EC cert into Bob's DB --------------------------
certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert
cert.sh: #317: Import Dave's EC cert into Bob's DB - PASSED
cert.sh SUCCESS: SMIME passed
cert.sh: Creating FIPS 140 DSA Certificates ==============
cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips -f ../tests.fipspw
cert.sh: #318: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED
cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #319: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED
cert.sh: Enable FIPS mode on database -----------------------
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips -fips true
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
FIPS mode enabled.
cert.sh: #320: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED
cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate --------------------------
certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@bogus.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise
Generating key. This may take a few moments...
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #321: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED
cert.sh SUCCESS: FIPS passed
cert.sh: Creating Server CA Issued Certificate for
EC Curves Test Certificates ------------------------------------
cert.sh: Initializing EC Curve's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/eccurves -f ../tests.pw
cert.sh: #322: Initializing EC Curve's Cert DB - PASSED
cert.sh: Loading root cert module to EC Curve's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/eccurves
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #323: Loading root cert module to EC Curve's Cert DB - PASSED
cert.sh: Import EC Root CA for EC Curves Test Certificates --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/eccurves -i ../CA/TestCA-ec.ca.cert
cert.sh: #324: Import EC Root CA for EC Curves Test Certificates - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp256 --------------------------
certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #325: Generate EC Cert Request for Curve-nistp256 - PASSED
cert.sh: Sign Curve-nistp256's EC Request --------------------------
certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw
cert.sh: #326: Sign Curve-nistp256's EC Request - PASSED
cert.sh: Import Curve-nistp256's EC Cert --------------------------
certutil -A -n Curve-nistp256-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #327: Import Curve-nistp256's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp384 --------------------------
certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #328: Generate EC Cert Request for Curve-nistp384 - PASSED
cert.sh: Sign Curve-nistp384's EC Request --------------------------
certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw
cert.sh: #329: Sign Curve-nistp384's EC Request - PASSED
cert.sh: Import Curve-nistp384's EC Cert --------------------------
certutil -A -n Curve-nistp384-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #330: Import Curve-nistp384's EC Cert - PASSED
cert.sh: Generate EC Cert Request for Curve-nistp521 --------------------------
certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/eccurves -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #331: Generate EC Cert Request for Curve-nistp521 - PASSED
cert.sh: Sign Curve-nistp521's EC Request --------------------------
certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw
cert.sh: #332: Sign Curve-nistp521's EC Request - PASSED
cert.sh: Import Curve-nistp521's EC Cert --------------------------
certutil -A -n Curve-nistp521-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #333: Import Curve-nistp521's EC Cert - PASSED
cert.sh: Initializing TestExt's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -f ../tests.pw
cert.sh: #334: Initializing TestExt's Cert DB - PASSED
cert.sh: Loading root cert module to TestExt's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #335: Loading root cert module to TestExt's Cert DB - PASSED
cert.sh: Import Root CA for TestExt --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -i ../CA/TestCA.ca.cert
cert.sh: #336: Import Root CA for TestExt - PASSED
cert.sh: Import DSA Root CA for TestExt --------------------------
certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -i ../CA/TestCA-dsa.ca.cert
cert.sh: #337: Import DSA Root CA for TestExt - PASSED
cert.sh: Import EC Root CA for TestExt --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -i ../CA/TestCA-ec.ca.cert
cert.sh: #338: Import EC Root CA for TestExt - PASSED
cert.sh: Generate Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #339: Generate Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's Request --------------------------
certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw
cert.sh: #340: Sign TestExt's Request - PASSED
cert.sh: Import TestExt's Cert --------------------------
certutil -A -n TestExt -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -f ../tests.pw -i TestExt.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #341: Import TestExt's Cert - PASSED
cert.sh SUCCESS: TestExt's Cert Created
cert.sh: Generate DSA Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #342: Generate DSA Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw
cert.sh: #343: Sign TestExt's DSA Request - PASSED
cert.sh: Import TestExt's DSA Cert --------------------------
certutil -A -n TestExt-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -f ../tests.pw -i TestExt-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #344: Import TestExt's DSA Cert - PASSED
cert.sh SUCCESS: TestExt's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #345: Generate mixed DSA Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw
cert.sh: #346: Sign TestExt's DSA Request with RSA - PASSED
cert.sh: Import TestExt's mixed DSA Cert --------------------------
certutil -A -n TestExt-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #347: Import TestExt's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestExt's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #348: Generate EC Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's EC Request --------------------------
certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw
cert.sh: #349: Sign TestExt's EC Request - PASSED
cert.sh: Import TestExt's EC Cert --------------------------
certutil -A -n TestExt-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -f ../tests.pw -i TestExt-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #350: Import TestExt's EC Cert - PASSED
cert.sh SUCCESS: TestExt's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestExt --------------------------
certutil -s "CN=TestExt, E=TestExt-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #351: Generate mixed EC Cert Request for TestExt - PASSED
cert.sh: Sign TestExt's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw
cert.sh: #352: Sign TestExt's EC Request with RSA - PASSED
cert.sh: Import TestExt's mixed EC Cert --------------------------
certutil -A -n TestExt-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #353: Import TestExt's mixed EC Cert - PASSED
cert.sh SUCCESS: TestExt's mixed EC Cert Created
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -S -n TestExt1 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
n
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -L -n TestExt1
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:aa:1b:3d:9e
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain View
,ST=California,C=US"
Validity:
Not Before: Wed May 31 23:03:24 2017
Not After : Thu Aug 31 23:03:24 2017
Subject: "CN=TestExt1,E=TestExt1@bogus.com,O=BOGUS NSS,L=Mountain Vie
w,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
c8:d7:ed:da:77:ae:d8:a2:80:70:5c:e4:3d:9b:08:a4:
2b:e5:80:fe:a0:44:aa:e4:1c:df:51:ef:dd:a0:c5:96:
69:c9:40:27:12:e3:98:39:52:a9:dd:53:36:5f:b2:38:
d2:d1:86:27:02:f4:79:14:fa:01:94:48:04:16:5e:6e:
2d:b3:98:ba:eb:f4:44:24:b6:f4:f6:f3:f4:4b:1e:10:
68:ca:44:00:fc:1d:31:b2:d4:11:28:a9:0a:ae:47:6a:
47:17:ad:08:d7:9a:60:83:23:86:65:e7:e4:35:0b:fa:
41:76:e3:f3:b0:28:c5:ce:24:aa:9f:36:aa:1c:69:9e:
ec:52:c2:3a:95:14:c5:74:c7:45:24:dc:d2:ec:71:f9:
b0:e3:68:ca:c1:f9:98:3c:fa:dd:69:4b:b3:70:70:0c:
a2:22:1c:09:b3:62:36:50:24:8f:58:a4:33:70:f7:df:
08:13:54:19:16:8d:5d:64:4e:00:ca:66:ed:ec:48:88:
6f:9b:3c:1a:00:87:9e:59:8e:3d:e1:8b:5a:15:ca:08:
5b:92:0f:d7:09:61:c5:8d:74:1b:08:12:49:8d:62:d8:
51:ed:a1:f7:94:91:32:15:0a:f1:3e:33:30:26:86:02:
fb:4e:db:a2:e8:19:0a:66:fd:b7:60:fa:be:1b:4d:c3
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Key Usage
Usages: Digital Signature
Non-Repudiation
Key Encipherment
Data Encipherment
Key Agreement
Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
8b:2f:e8:e2:04:3b:11:3f:2a:d5:af:6e:92:f5:a0:40:
e1:3c:b9:b1:2c:c4:5c:14:0f:ca:cb:e5:b9:7d:8a:4c:
df:ff:28:d3:54:2c:c0:90:15:b5:64:b8:16:35:57:24:
18:86:3a:fd:a4:d9:a8:81:ba:41:33:dc:f3:75:4d:6a:
25:2e:47:a4:a3:5b:c5:16:d9:c6:b8:ee:00:b2:34:6d:
03:cd:f7:4f:63:80:0e:5c:5e:ca:f7:43:3d:88:67:5d:
48:97:75:11:09:48:87:5d:d2:d3:33:6a:da:e0:45:b3:
54:5d:54:9c:47:a9:c2:05:dd:15:0f:79:bb:d1:93:58:
32:29:d2:65:75:9c:0a:e3:1f:27:85:41:04:1f:5f:cc:
47:11:2f:70:8b:45:41:47:56:29:f2:45:d5:da:16:4d:
3f:37:0d:da:32:63:bc:39:bd:35:74:8c:71:1a:28:b4:
85:e3:18:39:b7:fa:40:1b:8b:d3:e3:e1:d5:ae:ed:e6:
92:be:6d:94:13:4d:06:fb:4c:45:20:2c:26:66:a7:4f:
71:30:9d:cf:c7:6a:7f:cb:b0:9e:17:b6:51:86:14:27:
03:8b:b8:5d:4a:43:7e:10:2d:2a:ce:66:79:6b:f8:8a:
7e:d4:85:21:0f:41:7a:ac:bd:b3:e8:2c:db:0b:3a:bd
Fingerprint (SHA-256):
69:EA:F8:AA:83:DC:FC:58:F9:EA:52:5E:79:DE:E7:0F:82:49:C8:BD:0F:FC:70:04:77:F9:53:5A:62:AF:35:54
Fingerprint (SHA1):
1C:23:30:26:BA:E1:71:72:84:22:BA:86:2C:EF:D9:A7:18:1C:BF:1F
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #354: Certificate Key Usage Extension (1) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -S -n TestExt2 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
y
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -L -n TestExt2
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:aa:1b:3d:ad
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain View
,ST=California,C=US"
Validity:
Not Before: Wed May 31 23:03:46 2017
Not After : Thu Aug 31 23:03:46 2017
Subject: "CN=TestExt2,E=TestExt2@bogus.com,O=BOGUS NSS,L=Mountain Vie
w,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b2:c3:1f:38:02:67:bc:63:11:b9:2f:2c:79:c7:40:fc:
6b:84:67:c0:65:20:4f:74:53:d9:7c:e6:eb:e0:83:b1:
85:72:c6:36:fa:bf:f2:76:cf:ac:e4:b8:41:48:82:4b:
4a:e2:41:24:09:69:39:ce:da:5a:94:f7:68:4c:5e:16:
f3:07:51:c7:85:53:41:46:5e:8b:98:da:c9:ed:a2:2d:
73:2f:a9:7a:86:38:76:1b:5b:02:e3:79:1c:e9:c8:8d:
d8:40:f2:f7:19:2c:97:3c:b9:7b:4c:f4:1f:5b:dd:f0:
7c:e3:32:4d:a9:84:5d:34:d6:37:11:3e:b0:9b:08:46:
78:03:74:dd:09:65:62:01:d9:31:03:70:64:b5:5d:7f:
1d:b0:78:9b:c9:bb:6b:64:7d:51:b9:ce:6f:94:6f:61:
1a:1a:04:fa:9e:33:e5:a7:a7:53:30:f5:91:93:44:6f:
50:04:90:46:e5:59:10:9e:a4:5e:50:6d:53:57:9a:18:
a9:4d:55:ce:82:82:5c:8f:b9:cb:20:ac:1f:cc:04:2c:
62:19:18:7b:8f:b4:41:f0:aa:86:3f:3e:07:c2:20:3d:
9b:bc:6e:c9:7e:e9:50:07:75:bb:e1:53:68:1d:4b:32:
28:88:12:03:f3:76:11:fd:5b:14:5c:a1:b1:0d:29:bf
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Key Usage
Critical: True
Usages: Digital Signature
Non-Repudiation
Key Encipherment
Data Encipherment
Key Agreement
Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
38:97:e6:e2:45:6c:ab:36:28:8d:ff:e1:8d:72:ec:33:
ab:db:61:78:21:fa:7e:2b:1c:33:46:92:e0:d5:b6:99:
eb:81:b8:0a:6e:d6:40:cb:46:84:a4:ae:f0:96:d9:a6:
28:12:26:af:0d:45:72:14:20:10:62:d2:01:4c:c5:d7:
df:6c:d0:1a:35:90:ba:53:b1:98:0f:0b:05:03:03:90:
b5:1c:44:85:1c:34:da:6e:b8:48:76:e9:77:10:9e:4d:
27:01:11:7e:72:5d:11:c4:38:d0:e2:e2:5d:22:16:e6:
85:e1:35:24:72:c6:dc:7e:69:58:68:ac:be:15:15:1d:
96:4e:cc:a2:80:a6:34:e1:ea:aa:6e:4f:99:bb:46:16:
3b:76:52:78:87:67:0d:0c:7b:54:c0:9e:c3:14:44:ed:
0d:86:c1:ad:7f:ec:33:41:0d:fe:77:6a:99:3e:da:f6:
bd:ce:98:a0:f4:62:84:e4:8f:f3:11:5e:b2:f3:ba:e2:
3d:0f:57:01:09:54:07:37:a1:67:c3:5b:01:fa:18:c9:
65:23:c9:b4:cb:b7:3c:5f:1e:98:18:e4:a2:70:2a:c2:
0a:be:93:48:f9:d9:ee:02:a5:fc:04:5a:d2:c1:49:09:
f3:35:1a:69:e8:90:e2:c2:45:1f:a7:0a:78:8b:5b:d7
Fingerprint (SHA-256):
B4:82:A6:5D:CC:C6:F8:C7:3F:E1:2A:B5:E0:93:73:06:84:DB:32:17:F2:F1:88:E5:94:A7:BD:BE:3B:03:8E:F0
Fingerprint (SHA1):
6D:47:0E:99:59:9B:E4:44:82:53:3D:58:1F:99:56:CB:F7:93:28:69
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #355: Certificate Key Usage Extension (2) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -S -n TestExt3 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/test.args
certutil options:
y
-1
n
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -L -n TestExt3
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:aa:1b:3d:d6
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain View
,ST=California,C=US"
Validity:
Not Before: Wed May 31 23:03:55 2017
Not After : Thu Aug 31 23:03:55 2017
Subject: "CN=TestExt3,E=TestExt3@bogus.com,O=BOGUS NSS,L=Mountain Vie
w,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
bd:82:c3:cc:23:76:5d:69:b8:bf:63:2a:bf:7a:9e:69:
d4:d9:90:4f:f0:89:0b:1b:86:0f:37:72:f6:50:09:53:
e0:88:bc:a7:f5:36:4f:05:d6:33:85:b9:b1:fa:39:54:
92:31:2d:6d:a5:63:b6:a3:71:54:6a:a3:06:0e:93:e9:
a4:44:3b:85:24:e2:40:b5:92:94:6e:e4:7a:43:a4:17:
33:b9:69:b0:ab:4c:cc:c8:5e:0a:45:33:cf:0f:57:49:
57:19:98:a6:f2:8f:3f:9d:1a:c2:6b:93:77:a4:b7:e2:
98:ec:a3:df:64:67:81:75:b6:64:d2:c9:80:3a:86:a6:
5b:1d:49:43:1d:5a:2e:b2:d3:aa:05:8f:a0:4c:49:db:
48:37:5c:ea:96:ab:7c:fa:03:55:6a:be:d9:e5:59:54:
68:35:29:6a:80:88:d1:99:53:6e:7d:38:8b:65:68:8b:
7b:1e:7a:12:00:ae:14:93:05:f1:d6:b3:6d:33:21:2d:
e4:c5:7b:dd:04:23:b3:ca:be:af:66:26:60:d1:a5:fa:
37:29:7c:52:a8:6a:d7:9f:22:2a:c9:85:bb:6c:e3:4b:
6b:b7:2d:90:e9:23:d8:0a:98:7e:25:02:dd:a9:57:4e:
94:f9:ef:1d:ee:e9:15:5e:7a:0d:75:b3:91:94:07:1b
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
42:fc:55:83:fb:c0:bd:75:1a:dd:bb:8d:69:17:85:cc:
21:5d:a7:bf:45:30:a6:7a:ef:05:7f:7f:00:0d:70:f1:
7b:95:d7:4b:6e:f8:85:3b:de:ba:41:0b:26:5a:a9:ad:
0b:10:80:8e:68:f8:c3:c7:76:b7:5c:88:6a:e0:4b:c3:
97:ea:e4:62:db:8f:40:df:0c:82:63:ea:a9:1e:00:3b:
b8:f7:5c:9d:6e:df:41:e8:3d:59:d6:a9:26:f8:da:c1:
9e:b3:9e:ea:57:ea:0a:9e:dd:d7:5b:6c:f1:47:83:d8:
9d:5c:69:3f:53:7c:c6:52:c8:ce:4b:53:45:75:f1:d0:
9c:6f:d9:5b:cd:e3:b1:be:38:c2:a6:1d:cb:42:ca:17:
1c:ed:ef:d9:bc:80:ef:28:7c:58:c7:8a:30:5c:da:a5:
68:a7:49:df:22:fa:31:53:f5:b6:8c:6f:b7:4a:12:81:
ca:a3:77:46:6f:6a:b0:c9:29:17:e7:ba:c4:c1:b1:c3:
24:69:6c:0c:64:a4:e7:80:8b:2a:77:51:7a:8f:ba:ee:
31:85:1e:39:37:ce:9a:a9:c3:98:90:f6:54:00:99:9d:
73:df:b7:84:e3:4a:06:33:12:15:fc:20:d3:a5:e4:21:
34:c9:15:1e:f7:5f:ae:31:f8:35:64:59:66:72:6b:71
Fingerprint (SHA-256):
CD:E6:17:81:72:6D:E4:1E:12:3A:57:04:28:78:88:58:60:8D:12:DF:22:A6:6C:86:F6:28:50:16:44:24:20:12
Fingerprint (SHA1):
B3:FC:46:FE:A6:EF:3E:8B:24:3A:E0:BF:41:23:6F:22:18:2D:59:24
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #356: Certificate Basic Constraints Extension (3) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -S -n TestExt4 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/test.args
certutil options:
n
-1
y
Generating key. This may take a few moments...
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -L -n TestExt4
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:aa:1b:3d:e9
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain View
,ST=California,C=US"
Validity:
Not Before: Wed May 31 23:04:02 2017
Not After : Thu Aug 31 23:04:02 2017
Subject: "CN=TestExt4,E=TestExt4@bogus.com,O=BOGUS NSS,L=Mountain Vie
w,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
c0:3d:49:f3:3d:c4:73:72:2f:74:f3:82:53:74:d4:89:
0a:65:9d:08:3d:68:68:c1:1a:5e:e7:85:18:36:1a:00:
73:12:78:a2:2e:30:27:9d:22:5e:0d:a5:a7:23:1b:05:
bc:5a:4a:3a:95:be:4d:bf:7e:86:63:fc:79:9a:ef:d9:
8f:09:ec:92:e7:89:ab:a6:47:55:e3:15:7e:13:1a:3a:
d3:03:25:de:40:16:d5:5c:d0:b6:60:cb:06:70:ad:94:
1c:da:de:63:96:20:e3:7b:bd:d3:70:b4:44:e1:0d:0a:
da:b4:3f:3c:ac:65:44:38:5d:9c:d0:6a:d9:cc:37:26:
76:0c:5b:cb:57:21:10:a7:4e:eb:6e:36:56:6b:9d:3e:
90:06:ca:5f:f5:c9:b4:84:eb:c8:c2:80:90:9c:b0:ee:
78:5a:24:3b:f0:3c:e6:c5:ff:d6:b0:93:d4:a2:a2:e3:
2c:2c:ea:46:06:41:a9:eb:7a:a5:d2:c5:cd:2a:44:a7:
ef:5a:8e:c7:dd:73:25:2c:c3:4f:6e:36:4f:b3:34:d1:
21:38:cd:a0:fc:18:51:2a:a2:34:f5:84:51:b2:49:a5:
59:86:d2:56:69:25:57:7f:93:39:fd:e0:b5:8c:78:6a:
33:04:52:2b:3b:b3:a3:22:99:fc:35:5b:1e:82:d3:63
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Basic Constraints
Critical: True
Data: Is not a CA.
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
90:2b:3b:cb:55:90:1e:a0:b6:f6:96:2a:b7:89:70:ed:
09:53:46:7d:a7:8a:1d:81:d0:10:7b:5d:8e:8f:93:9c:
0b:7b:33:e7:87:6a:22:ac:a7:54:b0:cb:41:ae:10:02:
c6:71:52:04:e2:93:df:b0:42:7c:dc:fe:0d:49:53:00:
ef:0b:ab:5e:f2:22:c0:27:7b:93:7c:3d:c0:b7:61:5f:
9e:6b:55:5b:49:e4:f1:b9:fb:bf:3a:8b:09:cc:32:c1:
01:3e:3c:e7:81:87:00:4d:a0:a6:62:6b:22:57:54:c6:
09:8c:3e:dc:e8:06:48:cc:87:eb:5c:32:24:ce:d2:3f:
18:10:3f:bb:47:6e:f4:5d:b7:f6:92:f5:58:c3:d4:93:
ec:8f:60:de:e6:00:78:89:dd:ff:b6:aa:f5:fc:52:8d:
bc:1b:b5:86:7a:7b:a9:45:c3:9b:b1:09:a3:eb:d9:7e:
96:4a:2e:5e:d1:f1:3f:1a:6c:0e:de:02:13:80:fc:5b:
6f:3f:bf:24:a5:37:ce:77:b9:f9:56:3b:2c:b6:6a:e0:
b6:36:90:ec:53:dd:b1:e4:37:1d:3a:36:4e:35:b0:f9:
4d:24:83:95:d4:a9:d0:f0:48:f8:38:df:14:b3:64:63:
77:51:35:10:bd:92:13:bc:05:7a:1e:46:76:a9:60:36
Fingerprint (SHA-256):
14:43:8D:64:99:51:B9:E0:40:C2:A8:E4:57:D6:67:8A:59:27:97:66:ED:B6:9D:27:D8:58:84:97:C7:A0:3F:0A
Fingerprint (SHA1):
30:73:C1:39:10:40:60:E5:DB:B6:83:3F:76:18:B4:23:31:21:00:76
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #357: Certificate Basic Constraints Extension (4) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -S -n TestExt5 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/test.args
certutil options:
y
12341235123
y
Generating key. This may take a few moments...
Enter value for the authKeyID extension [y/N]?
Enter value for the key identifier fields,enter to omit:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Notice: Trust flag u is set automatically if the private key is present.
Enter value for the authCertSerial field, enter to omit:
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -L -n TestExt5
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:aa:1b:3d:f7
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain View
,ST=California,C=US"
Validity:
Not Before: Wed May 31 23:04:09 2017
Not After : Thu Aug 31 23:04:09 2017
Subject: "CN=TestExt5,E=TestExt5@bogus.com,O=BOGUS NSS,L=Mountain Vie
w,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
c9:f9:f4:8e:c9:27:c9:71:a1:54:ea:9b:5e:6c:dd:9b:
ed:85:85:4f:00:b6:d4:7b:f3:aa:88:10:b5:ae:a4:43:
af:bf:ec:9a:b3:39:6b:9d:54:97:5a:56:c5:d9:6a:cb:
51:da:da:6b:c3:30:1f:93:e4:e6:83:61:c0:ae:a8:2e:
81:42:4e:91:62:ec:bb:ce:b4:d4:53:ab:96:a8:15:75:
72:3f:6d:85:19:43:65:35:6e:56:82:bd:2a:8b:8f:a8:
90:ae:dc:c2:57:ff:f1:d9:23:37:52:36:a6:c5:8f:cf:
39:f9:73:f6:91:25:0b:73:ab:56:2a:bd:ee:fb:6a:21:
3a:67:01:ed:91:5b:0f:68:5e:07:ac:f6:80:e8:83:e1:
d8:e4:3c:b6:c7:cc:bb:e4:da:fc:4d:e0:21:57:21:a3:
ae:b5:72:d4:f5:ec:f2:a1:9f:79:1b:ab:67:0c:a9:42:
30:86:70:a1:31:38:ba:da:fb:7c:28:4a:c3:62:81:88:
10:a0:01:82:3c:0a:0c:d5:f7:3a:fd:ea:53:50:9e:bc:
be:14:39:00:c1:27:4f:fb:34:c1:ae:b9:c9:2f:95:f9:
65:52:32:54:fb:ce:93:2b:55:60:ad:a8:4b:63:85:8d:
8a:29:86:75:d0:1b:32:be:cc:7e:40:04:e8:ca:ea:a7
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Authority Key Identifier
Critical: True
Key ID:
12341235123
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
c8:f9:2f:8d:11:9a:a2:0d:d9:5e:0f:97:dc:10:b5:00:
07:47:1e:3e:21:99:7f:8f:48:54:1a:17:7a:13:05:43:
a1:c2:be:80:6e:3b:22:e2:da:eb:ae:8b:00:46:4a:12:
f4:65:fa:03:54:48:7c:fd:ca:15:a3:9f:34:2e:23:2d:
14:96:1b:1c:08:48:2d:5c:10:f5:10:9f:ef:95:89:2d:
e7:dd:71:cb:82:b5:8a:3c:87:78:c2:26:32:44:99:47:
6e:89:c3:ca:4c:cd:16:81:a5:19:96:ad:4f:5b:d2:66:
62:e4:22:6e:7c:11:e8:1f:09:6e:a8:04:dc:1e:10:2b:
23:2b:4e:1a:bb:aa:2f:4a:1b:17:5f:28:45:56:31:f9:
09:2e:e1:bb:b6:ff:10:e0:d5:68:bb:3c:6f:ed:0e:dc:
8f:19:e6:d0:b0:ad:2d:37:10:08:e5:7a:94:da:7a:bf:
6a:d3:28:76:1c:24:36:e8:f8:47:2a:78:03:9c:8a:7d:
46:32:12:0a:b9:2e:2a:21:07:7a:e0:d1:9c:b0:30:9f:
b2:ce:40:6e:c4:31:eb:2b:bd:3d:4a:de:cc:13:a8:de:
0f:dd:d4:5f:e7:a3:da:59:55:63:4e:53:f9:2e:f9:b7:
51:95:f4:9f:1c:2a:e5:c1:fa:fa:ec:b3:b4:fe:6b:c0
Fingerprint (SHA-256):
17:59:C2:27:23:AB:23:D0:75:CF:EF:AD:A8:04:97:CB:DF:37:DD:8A:3A:3A:CE:CC:67:6F:2C:49:BF:8E:34:4D
Fingerprint (SHA1):
5E:60:1C:56:DB:C1:24:27:7B:2C:4D:BF:E9:EF:0A:AE:33:F0:D1:4B
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #358: Certificate Authority Key Identifier Extension (5) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -S -n TestExt6 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/test.args
certutil options:
y
3
test.com
214123
y
Generating key. This may take a few moments...
Enter value for the authKeyID extension [y/N]?
Enter value for the key identifier fields,enter to omit:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Notice: Trust flag u is set automatically if the private key is present.
Enter value for the authCertSerial field, enter to omit:
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -L -n TestExt6
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:aa:1b:3e:03
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain View
,ST=California,C=US"
Validity:
Not Before: Wed May 31 23:04:24 2017
Not After : Thu Aug 31 23:04:24 2017
Subject: "CN=TestExt6,E=TestExt6@bogus.com,O=BOGUS NSS,L=Mountain Vie
w,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
aa:4c:16:5d:f7:21:c1:a6:e0:04:3f:d0:a1:b0:6d:f0:
ac:8b:3b:03:2d:5f:8b:9d:c8:70:f7:05:a3:a9:ac:e6:
a9:95:60:df:ee:42:b4:98:ca:4a:41:36:d8:2e:71:2c:
a9:54:f8:47:ea:e6:21:d2:1d:18:70:08:24:68:3a:f4:
6f:18:0b:35:36:3f:88:cd:41:86:d4:df:4d:37:db:48:
77:b3:df:31:6d:a3:1e:cb:ee:e4:26:c5:e2:6b:72:fb:
85:a0:88:1b:76:34:40:72:55:67:32:91:17:12:64:01:
20:39:28:df:80:b7:94:44:17:08:86:a5:2f:0d:aa:42:
8b:fc:6b:2a:7c:00:e7:10:be:a9:f8:96:fc:ec:09:99:
55:54:f4:48:88:c0:60:23:45:6d:7c:3f:22:82:1d:75:
21:ac:bd:ec:9c:6c:08:9f:99:ea:c4:b7:90:6e:6f:4c:
98:18:f7:be:6a:5a:c7:27:65:5e:93:b0:fb:81:a6:84:
29:43:77:04:33:da:37:0e:9e:38:95:37:40:d4:f4:ee:
ba:86:c0:fe:92:da:c0:79:ee:94:dd:c4:17:aa:f6:34:
e3:16:2e:d3:3d:5d:6f:2f:21:cc:4f:2b:b1:cc:6b:a0:
57:8d:74:ad:04:b4:5b:2e:08:1a:20:5d:5d:35:ae:b3
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Authority Key Identifier
Critical: True
Issuer:
DNS name: "test.com"
Serial Number:
214123
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
25:53:d1:cd:82:64:7e:d9:51:55:0b:2e:1f:88:5e:7b:
c7:bf:ca:fc:4f:b5:47:ad:9a:1f:33:51:16:a5:97:68:
a4:bd:fe:72:4c:d2:9c:9f:4e:7e:9f:fa:eb:f6:3f:bc:
24:b5:c1:e8:85:97:59:c7:ac:67:69:da:73:5d:74:d3:
56:8a:fa:73:5d:98:69:9d:b2:65:6d:48:e1:87:ef:68:
fe:5e:83:9b:47:bc:21:0c:43:79:ca:4b:a1:66:f1:92:
43:8d:89:2b:b0:cd:a9:30:8e:9c:80:45:a8:ca:22:01:
6f:96:bc:a7:54:8e:53:04:03:91:36:9c:43:de:ef:69:
2f:44:81:56:b4:1e:26:af:91:68:00:f7:3d:56:06:d0:
fe:01:1c:55:c4:d5:36:06:69:d9:b6:da:92:29:e8:71:
17:0e:f4:9a:b6:01:7d:ff:c7:94:d1:98:33:af:16:c3:
78:78:86:e8:9f:a9:1c:a7:ab:90:37:5b:d0:d6:29:62:
ba:8e:41:d7:da:a0:a1:f2:fd:77:31:5d:2a:7b:b5:eb:
b5:51:a7:22:61:57:6d:65:a0:d6:dd:35:67:7b:3f:20:
57:45:54:aa:84:ac:6c:03:fe:0c:e3:50:aa:bb:ad:f6:
52:8b:28:08:5a:95:8f:c9:79:c5:54:59:0c:ff:2f:87
Fingerprint (SHA-256):
34:69:7E:31:0B:DB:A0:E7:F5:B6:D4:BD:49:5F:18:62:C5:12:2C:82:24:6C:44:BC:AF:D9:FC:B1:E3:16:CE:67
Fingerprint (SHA1):
E0:0C:C8:E1:CA:9D:2E:9B:5F:EB:CA:06:31:59:2F:8B:D2:C1:00:D8
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #359: Certificate Authority Key Identifier Extension (6) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -S -n TestExt7 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/test.args
certutil options:
1
2
rfc822@name.tld
3
test.com
8
1.2.3.4
9
OID.0.2.213
10
0
10
n
n
Generating key. This may take a few moments...
Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice: >
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finish Choice: > Enter value for the CRL Issuer name:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Notice: Trust flag u is set automatically if the private key is present.
Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -L -n TestExt7
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:aa:1b:3e:20
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain View
,ST=California,C=US"
Validity:
Not Before: Wed May 31 23:04:40 2017
Not After : Thu Aug 31 23:04:40 2017
Subject: "CN=TestExt7,E=TestExt7@bogus.com,O=BOGUS NSS,L=Mountain Vie
w,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
da:e0:1d:1f:2b:10:b7:f1:de:28:b9:39:eb:3a:6b:4e:
f2:9f:1c:74:a9:75:4e:3c:9c:92:de:3d:e9:59:6c:f7:
46:52:80:2c:40:87:19:88:a0:8a:74:d1:8d:3c:d6:c3:
95:76:6c:0a:45:28:08:a4:51:47:99:a0:c2:35:18:61:
eb:eb:6b:eb:ff:2f:dc:4f:07:35:41:36:27:b0:09:ca:
38:01:23:da:68:51:eb:89:17:6f:e7:08:35:1a:24:b3:
bf:00:4f:15:fe:e1:5e:68:db:8f:ad:e0:33:5e:8d:ca:
92:b0:c6:2e:38:ee:ee:7c:6e:2f:89:9b:b4:c9:0f:b1:
98:f3:89:46:29:1d:f7:62:c9:e1:15:b5:e9:f8:b1:c4:
3d:3d:6e:f8:29:59:f8:ff:dc:e7:f7:71:68:e9:58:80:
34:62:02:3e:b2:45:86:4d:eb:42:1f:48:42:7b:2d:41:
0d:57:cc:5a:3b:20:57:50:b1:b9:25:e6:06:e7:56:43:
55:8c:6b:29:de:38:f2:e6:fa:db:4a:f5:e9:fd:c9:09:
68:99:64:ed:91:4e:db:de:ee:ec:fb:92:2a:d9:33:5e:
53:be:43:61:d9:34:2a:d5:3f:30:78:09:18:bf:84:c7:
66:9d:d1:26:07:68:3c:3b:20:0e:e0:dc:ad:d2:43:71
Exponent: 65537 (0x10001)
Signed Extensions:
Name: CRL Distribution Points
Distribution point:
RFC822 Name: "rfc822@name.tld"
DNS name: "test.com"
IP Address:
87:07:31:2e:32:2e:33:2e:34
Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51
Reasons:
80
(7 least significant bits unused)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
94:d2:59:24:54:7a:94:57:50:a2:d2:53:b3:1f:8b:a4:
c8:7b:0f:d5:7a:3c:ba:20:54:72:98:d4:cd:e7:ce:10:
89:63:25:c8:e3:82:ad:b1:a0:30:40:a8:e0:a6:98:3d:
11:95:7a:70:19:56:47:a8:47:c0:4a:a2:88:e3:b9:ea:
f5:f6:bb:6b:88:94:d1:5c:6b:fa:74:ca:cf:82:93:d1:
9b:81:cf:06:45:06:a8:db:d4:bd:73:85:34:7f:74:ee:
ac:08:eb:d2:c7:8d:dc:f1:8e:0e:b1:a5:35:49:b0:eb:
55:03:71:e8:d7:08:19:bb:65:cf:5c:a7:4f:5a:a9:a1:
40:70:8a:fb:e6:59:1d:66:bf:0a:18:10:70:29:da:9b:
be:c4:d4:24:8f:1d:de:b1:47:1e:cb:83:de:37:51:dc:
a2:2e:a7:8d:02:87:9a:a9:0d:93:f3:82:b0:1d:3e:5a:
81:b4:3e:ba:bb:1f:f7:ad:d5:94:72:da:0b:36:75:68:
76:e8:ce:ce:cb:19:46:33:3c:a0:7d:88:6f:23:e6:8e:
61:c5:63:60:40:89:93:f4:eb:23:9d:b1:94:be:43:6e:
bc:9f:bd:03:92:94:9a:22:e9:35:18:42:61:ec:f3:c8:
ec:d2:c2:ac:b8:e7:a9:ad:59:50:22:a2:f8:2b:f2:7a
Fingerprint (SHA-256):
A3:B9:B1:70:53:78:87:F6:A9:FA:A4:D6:33:E8:30:4E:53:93:7C:2C:20:EB:D0:8E:D6:2F:90:E6:FD:86:CF:F3
Fingerprint (SHA1):
16:CB:7F:3C:71:50:17:DC:F4:83:97:96:90:C1:23:E9:3B:9C:A0:D8
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #360: CRL Distribution Points Extension (7) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -S -n TestExt8 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/test.args
certutil options:
2
SN=asdfsdf
4
3
test.com
10
n
n
Generating key. This may take a few moments...
Enter the type of the distribution point name:
1 - Full Name
2 - Relative Name
Any other number to finish
Choice: > Enter the relative name:
Select one of the following for the reason flags
0 - unused
1 - keyCompromise
2 - caCompromise
3 - affiliationChanged
4 - superseded
5 - cessationOfOperation
6 - certificateHold
Any other number to finish Choice: > Enter value for the CRL Issuer name:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: >
Enter data:
Select one of the following general name type:
2 - rfc822Name
3 - dnsName
5 - directoryName
7 - uniformResourceidentifier
8 - ipAddress
9 - registerID
Any other number to finish
Choice: > Notice: Trust flag u is set automatically if the private key is present.
Enter another value for the CRLDistributionPoint extension [y/N]?
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -L -n TestExt8
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:aa:1b:3e:3e
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain View
,ST=California,C=US"
Validity:
Not Before: Wed May 31 23:04:52 2017
Not After : Thu Aug 31 23:04:52 2017
Subject: "CN=TestExt8,E=TestExt8@bogus.com,O=BOGUS NSS,L=Mountain Vie
w,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
bf:f8:00:3c:a5:37:0d:ff:10:c6:58:79:87:c3:99:9a:
bb:c7:25:d9:43:70:9a:d7:4d:41:ff:33:a7:f6:b8:a1:
a1:b9:66:da:36:a0:ab:07:90:a3:2b:ce:7c:05:8c:77:
06:c7:f3:66:de:ad:0d:04:0d:f6:45:80:6c:61:88:43:
ea:4f:68:ba:a4:75:b0:2c:6c:09:92:e7:6d:cb:cd:9b:
2e:25:21:cf:da:79:53:f0:28:d4:41:41:27:f1:15:d4:
4d:0b:cb:a5:8e:7c:dc:36:6f:d4:87:53:2f:42:3b:9f:
c3:37:cb:41:8d:b7:34:eb:66:20:89:0d:93:37:de:63:
1b:2a:bd:2a:54:54:08:55:9d:c3:ea:3d:0c:c1:4f:8f:
47:8b:96:b3:c6:57:59:62:05:b2:72:a4:23:b8:d0:cb:
f8:ae:65:f4:fc:c5:43:04:3a:b0:44:5c:73:7d:f4:bc:
cf:c2:85:97:d6:f6:c4:30:07:f1:6c:1b:6a:c1:69:fd:
8f:75:1b:bb:7c:5f:31:72:d9:8d:7f:2e:81:0a:ce:f5:
41:ec:21:99:6a:23:b9:53:8f:d5:e4:51:c3:9a:79:ab:
32:df:7e:bc:57:a1:2b:3a:2f:78:35:9a:e8:27:2a:c8:
c1:61:99:b9:cc:f2:d6:92:7f:c6:56:b8:c0:10:54:5d
Exponent: 65537 (0x10001)
Signed Extensions:
Name: CRL Distribution Points
Distribution point:
RDN: "SN=asdfsdf"
Reasons:
08
(7 least significant bits unused)
CRL issuer:
DNS name: "test.com"
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
77:a7:02:80:40:ab:93:ba:da:d0:a4:45:ec:6c:9b:6f:
d2:be:b2:9d:4a:db:3f:74:87:ba:4c:f7:ba:38:0d:a9:
50:06:f6:c0:cd:58:59:69:e0:16:37:d1:5e:47:3c:d3:
f0:0e:07:14:41:88:44:26:23:ea:b5:c7:8d:60:8e:dd:
d2:da:59:ee:23:a8:3f:6f:82:92:d8:0c:d8:bc:d8:cf:
bc:4c:8a:fb:d2:56:fa:e7:7b:53:8e:c1:17:13:0b:02:
1e:6c:80:2b:3d:39:57:fc:b8:07:82:04:7c:1c:06:e4:
18:83:95:c9:34:85:15:84:a7:41:e6:1b:84:69:24:de:
9a:d5:0c:c5:b3:21:59:40:02:29:a9:fb:ba:ab:ea:a5:
4e:2c:09:3d:31:f8:27:c5:6f:5c:98:ac:bd:a1:05:83:
6d:64:4e:c3:65:86:63:39:19:06:16:98:b0:f9:1f:14:
16:e7:1a:db:59:da:95:a4:dd:30:fd:82:24:58:03:da:
8c:0f:a7:ce:f1:19:03:b9:e8:e0:2e:e7:ac:d5:b1:13:
5b:d8:92:d6:2d:48:8b:41:2a:f4:03:a0:50:99:cb:f7:
57:8e:f2:ae:7e:8b:20:91:a2:aa:fe:f9:62:78:fa:0b:
06:c3:25:48:9e:e4:3c:86:1a:7c:e2:55:55:3d:0b:87
Fingerprint (SHA-256):
C7:0C:39:23:37:50:F7:0A:CF:A4:1D:0F:41:7B:CF:83:48:E3:B1:5F:DC:8B:2B:D3:2C:50:02:FA:87:8E:2C:25
Fingerprint (SHA1):
F3:34:80:96:C5:ED:BE:80:81:58:CD:FB:A3:6A:8E:37:84:42:6D:D2
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #361: CRL Distribution Points Extension (8) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -S -n TestExt9 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/test.args
certutil options:
0
1
2
10
n
Generating key. This may take a few moments...
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -L -n TestExt9
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:aa:1b:3e:54
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain View
,ST=California,C=US"
Validity:
Not Before: Wed May 31 23:05:02 2017
Not After : Thu Aug 31 23:05:02 2017
Subject: "CN=TestExt9,E=TestExt9@bogus.com,O=BOGUS NSS,L=Mountain Vie
w,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
c7:d6:c0:6b:3c:ed:8e:6d:1d:68:16:9c:4c:4d:78:71:
4f:f1:09:66:bd:77:9c:9d:7c:04:e3:00:95:a5:b4:77:
9f:c6:bb:00:0b:c2:b9:51:1b:a0:65:84:d9:4d:64:65:
f6:00:4a:06:2d:00:21:d7:f9:01:0f:47:38:f7:7a:05:
2c:7b:7c:dd:fc:a3:6a:df:92:ef:70:c5:c4:10:81:b7:
29:06:8b:23:74:d2:af:34:16:cf:15:e9:5d:bc:b2:1d:
ba:a9:a8:c4:29:35:f6:f3:98:f5:de:0d:c4:02:67:3d:
d7:59:01:f3:6d:17:c4:0e:a1:96:c8:e5:94:1c:11:e6:
b3:2b:49:08:b6:c8:af:15:4c:05:9b:42:9a:3f:d7:c5:
93:01:a6:63:20:04:9d:b9:3b:04:2e:1b:61:69:98:d6:
73:31:5b:8e:76:d7:00:c1:d4:d7:26:67:cb:3d:d5:93:
0a:67:82:82:7a:a5:43:e0:3f:96:8f:7f:34:92:45:f6:
ed:0d:0d:7e:e6:4f:30:21:c9:23:7c:b5:e5:19:25:b4:
2a:f9:b5:bf:be:cc:18:71:37:c9:32:6f:8b:75:ba:b0:
8f:a5:dd:16:1c:c7:f9:8b:25:38:9e:03:cf:e2:92:49:
08:d0:1b:6d:26:d9:8b:e8:0b:06:49:9a:a8:55:79:f5
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL Client,SSL Server,S/MIME>
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
77:36:c2:ae:30:36:ff:90:88:67:6d:54:ba:f4:a9:1c:
5a:4a:8e:53:09:11:af:24:fd:db:45:3f:48:98:ca:08:
37:c6:e8:4e:0b:cb:3a:ae:ab:92:9e:df:ce:d2:35:ce:
6d:19:4a:8f:e8:00:9c:30:f4:7f:8b:c1:97:45:df:8d:
fa:17:d4:7a:d3:81:a5:30:4c:6d:27:63:b8:7b:c1:ec:
41:66:a7:b4:e8:a1:a6:e6:b5:20:14:4a:6f:ad:8c:ac:
bb:0f:62:c9:da:84:66:01:1b:0b:38:14:c2:be:fe:f6:
e5:e9:11:79:7d:34:43:30:dd:96:91:22:b1:be:c7:43:
e3:b2:d6:2e:60:9a:b7:f0:c7:92:7f:06:c5:1a:6b:16:
06:e9:11:d3:d7:b0:3a:11:12:a7:1b:67:6d:56:ea:d8:
17:da:2f:c2:7e:70:fb:c3:e5:55:73:0e:27:94:3b:5a:
3b:67:95:45:24:04:ed:f1:c6:71:82:d2:f6:58:b2:87:
26:2a:75:18:e4:d1:e9:e8:0a:2a:1e:ac:ac:a3:e2:8e:
95:d9:ac:68:0b:33:f9:65:94:71:1a:86:8e:b5:12:d6:
b8:da:b9:0c:d9:d3:a5:fe:ff:c2:e7:a9:80:22:0a:7e:
38:ad:d5:c3:ae:11:39:11:4e:24:8e:17:83:0b:cb:4c
Fingerprint (SHA-256):
73:B1:59:E4:70:5C:45:DA:85:3A:12:9A:77:F4:D3:97:54:AD:13:81:39:2D:DC:6F:40:2C:91:4C:1F:B6:61:80
Fingerprint (SHA1):
C9:D1:66:4E:EA:F2:AA:C1:07:90:15:21:E9:B2:B2:A5:B1:93:3E:71
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #362: Certificate Type Extension (9) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -S -n TestExt10 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/test.args
certutil options:
0
1
2
3
4
5
6
10
y
Generating key. This may take a few moments...
0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
7 - Microsoft Trust List Signing
Other to finish
> 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
7 - Microsoft Trust List Signing
Other to finish
> 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
7 - Microsoft Trust List Signing
Other to finish
> 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
7 - Microsoft Trust List Signing
Other to finish
> 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
7 - Microsoft Trust List Signing
Other to finish
> 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
7 - Microsoft Trust List Signing
Other to finish
> 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
7 - Microsoft Trust List Signing
Other to finish
> 0 - Server Auth
1 - Client Auth
2 - Code Signing
3 - Email Protection
4 - Timestamp
5 - OCSP Responder
6 - Step-up
7 - Microsoft Trust List Signing
Other to finish
> Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -L -n TestExt10
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:aa:1b:3e:69
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain Vi
ew,ST=California,C=US"
Validity:
Not Before: Wed May 31 23:05:09 2017
Not After : Thu Aug 31 23:05:09 2017
Subject: "CN=TestExt10,E=TestExt10@bogus.com,O=BOGUS NSS,L=Mountain V
iew,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
c7:85:d6:7d:3c:16:9f:c2:96:00:5c:d7:3b:56:c9:a5:
5b:5f:17:b6:37:75:2d:60:ef:80:88:32:e1:38:dd:9e:
d7:a6:07:fe:80:67:e9:55:36:4f:da:86:3d:9c:e7:f3:
db:c0:51:82:f6:cf:ad:ff:7c:26:3c:a4:17:51:10:fe:
e0:bd:bf:bb:9a:5c:9d:b4:94:62:7b:2e:a9:a0:13:26:
84:19:55:2f:1f:0c:93:58:f8:86:17:3c:14:f0:cf:6a:
1d:52:d0:5d:96:7e:99:64:a0:80:60:d8:c6:37:61:8a:
14:ea:34:97:9f:9a:69:40:51:1f:a3:97:c7:1b:04:61:
fd:13:27:76:46:e0:7a:a2:21:27:f7:cd:e1:e5:2e:12:
5f:ca:fb:f6:e4:9b:d8:a0:60:01:e5:4d:dd:8e:6a:d8:
c0:3d:28:8c:9c:1b:0d:2a:68:f6:64:9d:0d:d0:aa:b7:
3b:74:73:5a:52:3b:d8:c6:15:50:5b:27:97:9f:41:c4:
63:44:93:fb:cd:ae:a7:bb:69:6c:c2:09:1b:61:ee:ad:
5a:0f:99:44:71:86:e9:41:8a:ea:75:1a:99:47:57:3e:
3c:20:43:9d:a5:14:1e:75:32:17:c2:6f:aa:83:55:71:
90:d8:0b:39:f8:14:ab:b9:5e:ea:4f:55:9d:c5:1c:cb
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Extended Key Usage
Critical: True
TLS Web Server Authentication Certificate
TLS Web Client Authentication Certificate
Code Signing Certificate
E-Mail Protection Certificate
Time Stamping Certifcate
OCSP Responder Certificate
Strong Crypto Export Approved
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
a6:a6:9a:04:57:96:9e:a3:28:bc:fa:47:21:e4:61:48:
0a:28:da:df:c5:42:21:ad:57:4b:76:17:9b:48:67:51:
24:b8:37:6d:31:52:fc:07:b5:83:33:01:a9:ab:e9:ec:
cf:2b:6c:c7:8e:2a:33:14:ab:17:63:17:34:f6:9f:a0:
c4:31:ef:dd:87:a1:33:c5:cd:1e:a4:76:53:b8:b6:2c:
82:b4:cb:d7:cc:20:d8:b2:b7:6d:c8:e9:61:4a:10:dc:
cd:4d:2d:7d:cf:ab:b4:99:17:fd:f3:2a:7f:02:c7:3f:
a1:57:b4:c0:f3:f2:57:49:be:8c:5a:9e:a1:f3:75:b9:
e5:40:ff:a4:4f:a6:31:ad:08:86:1f:f9:24:d8:62:fe:
44:68:9a:fd:a1:46:48:4a:e4:b2:7e:39:6c:97:f1:63:
a1:5c:45:e6:b2:5e:38:1a:3d:24:e6:a4:77:cc:ee:c7:
20:ca:15:63:d0:33:fd:42:1b:6b:b9:6f:2f:08:ee:63:
ee:4f:10:49:0e:d4:ef:e4:57:3e:8d:51:14:bb:13:46:
3e:9d:b3:dc:8d:22:c7:1c:9c:a2:6a:dc:34:14:1f:2c:
e6:fa:aa:7d:82:f7:13:bb:08:45:c6:43:91:ac:66:db:
50:d2:6a:32:5d:ee:35:85:67:2a:3d:1b:d0:00:52:3d
Fingerprint (SHA-256):
2E:F8:38:A1:60:98:19:6F:C3:4A:82:5F:FA:92:1D:0C:D0:D4:66:61:B8:F6:B6:66:AD:22:EF:80:C8:BC:F4:B9
Fingerprint (SHA1):
C0:7C:2C:48:B4:8C:98:DC:45:40:6F:4B:1C:23:FF:47:8E:09:FC:C7
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #363: Extended Key Usage Extension (10) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -S -n TestExt11 -t u,u,u -o /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/test.args
certutil options:
1
2
3
4
5
6
10
n
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -L -n TestExt11
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:aa:1b:3e:77
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain Vi
ew,ST=California,C=US"
Validity:
Not Before: Wed May 31 23:05:15 2017
Not After : Thu Aug 31 23:05:15 2017
Subject: "CN=TestExt11,E=TestExt11@bogus.com,O=BOGUS NSS,L=Mountain V
iew,ST=California,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
c5:af:12:50:ee:02:18:ba:d1:2c:88:2d:10:99:49:81:
02:9d:68:19:c8:d5:e0:03:cb:de:64:7a:41:7a:70:e1:
8d:e3:d0:26:b3:a8:a3:19:a5:8b:73:f4:74:27:63:29:
fd:5f:a9:45:7e:6f:00:db:ba:8e:6c:1c:05:4e:dd:b2:
65:8c:e9:07:7b:28:76:4a:b9:0c:fe:a2:08:88:cd:cd:
a7:2e:0d:d9:81:1b:39:1a:94:6e:ca:17:e0:92:6e:5b:
4b:73:49:2d:96:99:5e:d5:76:6c:bf:fc:d7:80:6a:85:
3d:a3:7e:92:98:85:d9:d3:ab:08:2e:ea:8c:96:bd:0a:
d6:cb:1c:de:ee:c9:87:4e:7a:13:64:6e:34:fa:a0:7c:
7f:ac:bd:ea:17:92:c7:78:eb:66:bf:cb:1b:fd:6e:80:
8a:87:bc:75:0f:0e:06:b2:d4:e4:2e:8c:78:d7:84:a1:
1b:45:af:d3:f7:86:3c:49:4f:7e:2b:da:eb:50:a0:b8:
da:6f:84:b3:9d:e1:43:45:83:b9:9c:fe:a1:b9:42:e0:
92:2a:a4:11:1b:fd:1d:42:46:81:af:2d:db:e0:4b:0c:
2d:e2:49:75:cd:d7:29:66:0c:0b:23:90:6a:f1:09:2c:
3d:6d:9a:c2:58:91:2b:de:50:86:0e:57:6a:a5:72:29
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Key Usage
Usages: Non-Repudiation
Key Encipherment
Data Encipherment
Key Agreement
Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
3e:81:9c:4c:51:a9:10:08:0d:ea:bd:84:1c:5d:48:40:
4e:ac:88:76:57:83:54:94:e4:23:3a:e7:14:c2:01:93:
e8:3d:7a:4e:0a:ec:76:c9:b8:ac:a5:e3:e5:ff:4e:6c:
84:05:28:8f:80:18:59:59:77:97:b5:59:aa:d7:22:59:
c9:f3:33:75:df:1b:34:47:39:d6:eb:4c:f1:49:eb:7c:
10:e0:c7:c5:de:7c:12:af:ab:14:91:2e:d6:82:8a:c2:
18:fc:e0:dc:f9:86:d0:a7:10:17:77:d0:36:5c:48:1d:
e6:1a:31:57:a3:95:50:e3:cf:36:cb:8c:d3:27:08:ba:
37:9b:1f:d2:16:81:20:f2:1d:13:04:1c:85:b7:26:72:
2b:12:48:5b:32:67:2b:76:90:62:b5:a8:ee:f1:b6:1a:
06:e0:50:fa:9b:79:c4:93:21:f9:31:64:a8:ed:f6:28:
de:84:80:3a:d1:05:83:07:52:c6:5c:e1:1b:98:09:0a:
ee:37:9e:77:9a:ac:8f:a3:c0:eb:2a:2c:5f:a4:b2:f9:
90:6b:ad:fe:e2:f4:15:4d:64:44:f1:f4:8a:07:13:80:
af:24:78:6f:fc:76:1b:76:fa:aa:8f:02:37:13:07:09:
9a:d2:ee:9e:43:b8:b0:52:d4:e0:03:e5:3c:4a:2a:e5
Fingerprint (SHA-256):
04:45:DE:36:C6:7A:26:CE:3A:A8:CD:30:E1:64:0F:19:36:91:AD:0E:E4:A1:A6:5B:A4:47:4B:75:41:5A:17:9C
Fingerprint (SHA1):
61:7A:C1:58:DD:32:E7:E7:E2:81:43:7D:5C:8B:BD:43:9D:2B:8A:CA
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #364: Certificate Key Usage Extension (11) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com
Generating key. This may take a few moments...
certutil: Problem creating SubjectAltName extension: error 0: Success
certutil: unable to create cert (Success)
cert.sh: #365: create cert with invalid SAN parameter (12) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com
Generating key. This may take a few moments...
certutil: Problem creating SubjectAltName extension: error 0: Success
certutil: unable to create cert (Success)
cert.sh: #366: create cert with invalid SAN parameter (13) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com
Generating key. This may take a few moments...
cert.sh: #367: create cert with valid SAN parameter (14) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -f ../tests.pw -L -n WithSAN
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:aa:1b:3e:9e
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=example.com"
Validity:
Not Before: Wed May 31 23:05:57 2017
Not After : Thu Aug 31 23:05:57 2017
Subject: "CN=example.com"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
e9:35:03:5d:0f:51:43:9f:d3:3b:cb:08:c2:49:e8:98:
f9:9f:46:93:0f:db:a3:63:e3:5f:aa:c9:a9:a5:48:00:
75:b0:14:2e:2d:d9:2f:b4:4a:22:bc:f4:55:cc:bf:1c:
2b:f2:43:23:ec:46:c7:7c:9d:d6:1b:f2:9c:30:e4:64:
b2:de:fc:ef:e1:22:7d:d3:33:9a:7d:46:5f:76:d2:5f:
2f:56:1f:89:96:72:c7:39:f5:42:17:db:1c:7e:b1:0c:
43:0f:5c:4d:b5:9f:a5:9e:af:31:f5:7e:4c:9b:90:ee:
e5:f4:64:28:0d:d6:56:e6:3d:c5:a7:38:6a:d2:8d:e5:
cf:92:5d:34:51:74:3b:d8:cb:47:f7:f3:1d:82:16:cc:
1a:c7:a2:89:1f:c9:33:46:b8:c6:e4:cb:cc:03:0a:cd:
6b:8e:fe:d6:c0:d0:49:77:97:49:5a:4e:33:a0:89:d2:
3b:11:cc:6b:ec:db:03:87:3d:72:f2:cd:50:9c:66:41:
a9:4f:ca:f4:35:65:8f:b0:4a:99:78:96:97:0a:c6:3f:
b0:83:c6:87:71:79:56:ef:32:00:2e:69:0e:06:51:9f:
d4:dd:c3:30:97:af:8a:3c:13:16:b3:a4:96:64:64:9c:
2e:bc:14:c2:f3:48:3e:6c:fc:f3:0d:44:2b:6d:f2:89
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Subject Alt Name
DNS name: "example.com"
DNS name: "www.example.com"
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
ac:d4:c9:58:69:a2:db:6d:2e:2c:53:54:4c:d7:1f:2b:
fe:e3:a9:6f:7d:b9:1e:06:79:37:7d:3f:0a:4c:ef:66:
48:15:2d:d6:70:9c:36:23:a4:2c:78:b2:3c:20:62:56:
18:7b:ef:56:0b:9e:59:46:e4:f4:83:c0:d5:f6:b5:6b:
1d:4c:f3:97:03:95:16:3a:4f:e7:6c:85:d0:1d:50:8e:
cc:6f:52:e6:f0:5e:8a:dd:36:c7:d1:9d:50:41:84:ea:
13:4e:38:ca:08:bc:ff:72:48:41:d2:02:ae:04:60:c8:
bd:cc:7c:c1:0f:74:3b:27:1a:bf:a3:f9:e7:ab:bd:aa:
3f:4d:5c:a7:5c:f8:03:de:1e:af:4c:04:77:e0:b8:1f:
41:b1:93:2d:5e:9d:75:15:ab:57:20:18:61:02:b3:7f:
86:a1:8e:3c:85:3a:3f:cd:ab:ba:e7:ec:b1:46:98:aa:
80:c9:13:11:6b:bc:4c:22:53:d8:f7:0a:23:01:d7:bc:
5d:26:cf:3c:5d:8c:db:8a:16:73:7c:51:49:15:d1:b5:
57:94:e5:8a:67:4f:29:05:46:ca:33:5c:b8:61:07:97:
95:b6:9e:da:69:62:b0:4d:79:31:ac:62:d5:1c:35:15:
3c:7d:58:8a:aa:a1:5b:86:ba:15:fd:8d:c1:35:d3:3e
Fingerprint (SHA-256):
6E:56:40:9B:BD:5E:E1:6C:C1:D8:BC:21:CA:9B:14:A5:2B:62:F9:65:D6:F0:3D:32:FD:75:73:CD:D9:A3:1A:2E
Fingerprint (SHA1):
78:40:1F:3E:FA:AA:2D:53:38:70:27:75:58:8F:3B:5E:7C:F6:58:C1
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #368: create cert with valid SAN parameter (15) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17
writing output to /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/sanext.der
cert.sh: #369: dump extension 2.5.29.17 to file /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/sanext.der (16) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -f ../tests.pw -D -n WithSAN
cert.sh: #370: create cert with valid SAN parameter (17) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -f ../tests.pw -L -n WithSAN
certutil: Could not find cert: WithSAN
: PR_FILE_NOT_FOUND_ERROR: File not found
certutil: Could not find cert: WithSAN
: PR_FILE_NOT_FOUND_ERROR: File not found
cert.sh: #371: expect failure to list cert, because we deleted it (18) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/sanext.der
Generating key. This may take a few moments...
certutil: error parsing generic extension parameter /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/sanext.der: error 0: Success
cert.sh: #372: create cert with invalid generic ext parameter (19) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/sanext.der
Generating key. This may take a few moments...
certutil: error parsing generic extension parameter not-critical:/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/sanext.der: error 0: Success
cert.sh: #373: create cert with invalid generic ext parameter (20) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/sanext.der,2.5.29.17:critical:/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/sanext.der
Generating key. This may take a few moments...
certutil: error parsing generic extension parameter not-critical:/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/sanext.der,2.5.29.17:critical:/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/sanext.der: error 0: Success
cert.sh: #374: create cert with invalid generic ext parameter (21) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions/sanext.der
Generating key. This may take a few moments...
cert.sh: #375: create cert with valid generic ext parameter (22) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -f ../tests.pw -L -n WithSAN
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
00:aa:1b:3e:f2
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=example.com"
Validity:
Not Before: Wed May 31 23:06:27 2017
Not After : Thu Aug 31 23:06:27 2017
Subject: "CN=example.com"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
c3:e4:c4:c3:62:bc:37:2f:23:e0:11:63:14:94:10:09:
e9:91:87:88:24:96:0d:27:29:d9:09:43:a0:2f:e1:80:
19:df:b2:17:de:57:60:dd:10:6e:55:01:a1:13:7e:5d:
aa:20:31:69:53:08:b6:05:96:88:05:26:10:5d:c4:16:
69:b8:04:82:fd:ed:c2:00:ba:02:47:8e:2c:57:52:e0:
35:19:b5:30:f3:3c:71:b4:8e:e4:a0:ca:76:d0:a4:c2:
0c:96:ee:18:78:c6:e3:49:d1:b7:3a:c5:82:fd:8a:1b:
96:8c:67:b8:89:00:2a:e2:d5:10:5e:04:41:ed:34:da:
e7:d3:32:86:cc:24:bf:1f:56:f0:88:84:56:f0:75:fb:
bf:a2:8c:03:4a:48:4a:d1:c3:8d:3d:b0:b8:f4:9a:33:
61:a7:bb:51:d2:cc:89:5c:8d:4a:8b:29:7a:38:83:25:
ac:19:c2:06:99:79:8b:c5:08:6e:8c:66:8e:66:25:10:
73:5c:75:39:86:8d:2d:e9:de:e8:20:a6:59:29:8f:89:
75:20:6f:49:84:08:93:2b:f8:6a:65:b3:15:f4:c7:fc:
f3:df:ac:4d:70:94:52:16:b2:69:14:7a:4d:ef:6b:7d:
e9:83:7d:22:34:0d:e0:17:73:47:e9:ac:2a:a8:1e:1f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Subject Alt Name
DNS name: "example.com"
DNS name: "www.example.com"
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
9b:0d:72:7e:3f:e4:e1:7e:32:f0:d1:52:88:35:fc:5e:
ff:0f:56:58:52:2b:c3:0e:9a:7b:c2:e6:90:9b:69:fb:
13:59:9b:d0:98:bc:99:96:28:75:e8:b7:46:99:01:36:
60:9d:56:16:db:32:99:85:6d:8a:1c:5f:2d:e7:3a:fa:
d6:28:50:fa:8d:10:a6:e1:ff:cf:06:c6:46:b7:20:fa:
0a:cc:83:6f:17:6a:aa:21:ba:38:27:9f:d1:05:c0:36:
ac:29:ee:0b:e8:ba:ac:4c:29:d5:36:b0:c6:e6:07:30:
42:a7:98:97:8c:38:41:55:33:f6:07:55:1b:59:6c:91:
ab:e1:63:94:c5:ee:08:4f:07:b3:bd:2a:31:9d:33:56:
d9:53:e3:66:d7:ca:0b:8d:74:b1:a6:23:bc:81:f3:25:
fd:77:81:99:58:cd:3b:bd:d3:df:ec:77:93:93:a8:73:
fe:6f:96:aa:a0:07:6c:3e:18:1f:46:5f:3b:ac:8a:d2:
78:2e:8f:5a:b6:9d:98:58:28:63:ec:1a:f1:b3:a1:ef:
28:0c:63:a8:cb:d2:c5:4c:b1:f0:fd:ec:59:d4:55:06:
39:c1:49:55:14:29:f6:9d:8a:f2:fd:2b:2b:79:d8:bc:
ef:b0:ae:3b:89:8b:e0:f7:bf:ff:38:94:49:4e:26:bc
Fingerprint (SHA-256):
43:BA:26:50:BE:BB:56:5B:75:37:F4:E4:7E:02:CB:E9:FF:E5:E4:12:C4:4D:81:14:C0:0B:56:87:0B:C9:F9:8F
Fingerprint (SHA1):
C6:9C:75:AE:64:B6:0A:F8:B0:9F:00:52:1E:1E:53:80:7C:34:D1:83
Certificate Trust Flags:
SSL Flags:
User
Email Flags:
User
Object Signing Flags:
User
cert.sh: #376: create cert with valid generic ext parameter (23) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -f ../tests.pw -D -n WithSAN
cert.sh: #377: create cert with valid generic ext parameter (24) - PASSED
certutil -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/cert_extensions -f ../tests.pw -L -n WithSAN
certutil: Could not find cert: WithSAN
: PR_FILE_NOT_FOUND_ERROR: File not found
certutil: Could not find cert: WithSAN
: PR_FILE_NOT_FOUND_ERROR: File not found
cert.sh: #378: expect failure to list cert, because we deleted it (25) - PASSED
cert.sh: Create A Password Test Cert ==============
cert.sh: Create A Password Test Ca --------
cert.sh: Creating a CA Certificate PasswordCA ==========================
/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/dbpass
cert.sh: Creating CA Cert DB --------------------------
certutil -s "CN=TestExt11, E=TestExt11@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/dbpass -f ../tests.pw
cert.sh: #379: Creating CA Cert DB - PASSED
cert.sh: Loading root cert module to CA Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/dbpass
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #380: Loading root cert module to CA Cert DB - PASSED
cert.sh: Certificate initialized ----------
cert.sh: Creating CA Cert PasswordCA --------------------------
certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Notice: Trust flag u is set automatically if the private key is present.
Is this a critical extension [y/N]?
cert.sh: #381: Creating CA Cert PasswordCA - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n PasswordCA -r -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/dbpass -o root.cert
cert.sh: #382: Exporting Root Cert - PASSED
cert.sh: Changing password on Password Test Cert's Cert DB --------------------------
certutil -W -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/dbpass -f ../tests.pw -@ ../tests.fipspw
Password changed successfully.
cert.sh: #383: Changing password on Password Test Cert's Cert DB - PASSED
cert.sh: Generate Certificate for Password Test Cert with new password --------------------------
certutil -s "CN=Password Test Cert, E=password@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/dbpass -f ../tests.fipspw -z ../tests_noise
Generating key. This may take a few moments...
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #384: Generate Certificate for Password Test Cert with new password - PASSED
cert.sh SUCCESS: PASSWORD passed
cert.sh: Verify Certificate for Password Test Cert with new password --------------------------
certutil -V -n PasswordCert -u S -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/dbpass -f ../tests.fipspw
certutil: certificate is valid
cert.sh: #385: Verify Certificate for Password Test Cert with new password - PASSED
cert.sh: Creating Distrusted Certificate
cert.sh: Initializing Distrusted's Cert DB --------------------------
certutil -N -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust -f ../tests.pw
cert.sh: #386: Initializing Distrusted's Cert DB - PASSED
cert.sh: Loading root cert module to Distrusted's Cert DB --------------------------
modutil -add RootCerts -libfile /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so -dbdir /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit browser before continuing this operation. Type
'q <enter>' to abort, or <enter> to continue:
Module "RootCerts" added to database.
cert.sh: #387: Loading root cert module to Distrusted's Cert DB - PASSED
cert.sh: Import Root CA for Distrusted --------------------------
certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust -i ../CA/TestCA.ca.cert
cert.sh: #388: Import Root CA for Distrusted - PASSED
cert.sh: Import DSA Root CA for Distrusted --------------------------
certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust -i ../CA/TestCA-dsa.ca.cert
cert.sh: #389: Import DSA Root CA for Distrusted - PASSED
cert.sh: Import EC Root CA for Distrusted --------------------------
certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust -i ../CA/TestCA-ec.ca.cert
cert.sh: #390: Import EC Root CA for Distrusted - PASSED
cert.sh: Generate Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #391: Generate Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's Request --------------------------
certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw
cert.sh: #392: Sign Distrusted's Request - PASSED
cert.sh: Import Distrusted's Cert --------------------------
certutil -A -n Distrusted -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust -f ../tests.pw -i Distrusted.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #393: Import Distrusted's Cert - PASSED
cert.sh SUCCESS: Distrusted's Cert Created
cert.sh: Generate DSA Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #394: Generate DSA Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw
cert.sh: #395: Sign Distrusted's DSA Request - PASSED
cert.sh: Import Distrusted's DSA Cert --------------------------
certutil -A -n Distrusted-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust -f ../tests.pw -i Distrusted-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #396: Import Distrusted's DSA Cert - PASSED
cert.sh SUCCESS: Distrusted's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #397: Generate mixed DSA Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw
cert.sh: #398: Sign Distrusted's DSA Request with RSA - PASSED
cert.sh: Import Distrusted's mixed DSA Cert --------------------------
certutil -A -n Distrusted-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust -f ../tests.pw -i Distrusted-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #399: Import Distrusted's mixed DSA Cert - PASSED
cert.sh SUCCESS: Distrusted's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #400: Generate EC Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's EC Request --------------------------
certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw
cert.sh: #401: Sign Distrusted's EC Request - PASSED
cert.sh: Import Distrusted's EC Cert --------------------------
certutil -A -n Distrusted-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust -f ../tests.pw -i Distrusted-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #402: Import Distrusted's EC Cert - PASSED
cert.sh SUCCESS: Distrusted's EC Cert Created
cert.sh: Generate mixed EC Cert Request for Distrusted --------------------------
certutil -s "CN=Distrusted, E=Distrusted-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #403: Generate mixed EC Cert Request for Distrusted - PASSED
cert.sh: Sign Distrusted's EC Request with RSA --------------------------
certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw
cert.sh: #404: Sign Distrusted's EC Request with RSA - PASSED
cert.sh: Import Distrusted's mixed EC Cert --------------------------
certutil -A -n Distrusted-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust -f ../tests.pw -i Distrusted-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #405: Import Distrusted's mixed EC Cert - PASSED
cert.sh SUCCESS: Distrusted's mixed EC Cert Created
cert.sh: Mark CERT as unstrusted --------------------------
certutil -M -n Distrusted -t p,p,p -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust -f ../tests.pw
cert.sh: #406: Mark CERT as unstrusted - PASSED
cert.sh: Creating Distrusted Intermediate
cert.sh: Creating a CA Certificate DistrustedCA ==========================
/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/CA
cert.sh: Creating CA Cert DistrustedCA --------------------------
certutil -s "CN=DistrustedCA, E=DistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010
Generating key. This may take a few moments...
0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> 0 - Digital Signature
1 - Non-repudiation
2 - Key encipherment
3 - Data encipherment
4 - Key agreement
5 - Cert signing key
6 - CRL signing key
Other to finish
> Is this a critical extension [y/N]?
Is this a CA certificate [y/N]?
Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]?
0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> 0 - SSL Client
1 - SSL Server
2 - S/MIME
3 - Object Signing
4 - Reserved for future use
5 - SSL CA
6 - S/MIME CA
7 - Object Signing CA
Other to finish
> Is this a critical extension [y/N]?
cert.sh: #407: Creating CA Cert DistrustedCA - PASSED
cert.sh: Exporting Root Cert --------------------------
certutil -L -n DistrustedCA -r -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/CA -o root.cert
cert.sh: #408: Exporting Root Cert - PASSED
cert.sh: Import Distrusted Intermediate --------------------------
certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust -i ../CA/DistrustedCA.ca.cert
cert.sh: #409: Import Distrusted Intermediate - PASSED
cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA --------------------------
certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #410: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED
cp: `./req' and `/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/CA/req' are the same file
cert.sh: Sign LeafChainedToDistrustedCA's Request --------------------------
certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw
cert.sh: #411: Sign LeafChainedToDistrustedCA's Request - PASSED
cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u --------------------------
certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #412: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server --------------------------
certutil -V -n LeafChainedToDistrustedCA -u V -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #413: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client --------------------------
certutil -V -n LeafChainedToDistrustedCA -u C -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #414: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer --------------------------
certutil -V -n LeafChainedToDistrustedCA -u S -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #415: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient --------------------------
certutil -V -n LeafChainedToDistrustedCA -u R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user.
cert.sh: #416: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder --------------------------
certutil -V -n LeafChainedToDistrustedCA -u O -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #417: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED
cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer --------------------------
certutil -V -n LeafChainedToDistrustedCA -u J -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #418: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED
cert.sh: Verify Distrusted Cert for SSL Server --------------------------
certutil -V -n Distrusted -u V -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #419: Verify Distrusted Cert for SSL Server - PASSED
cert.sh: Verify Distrusted Cert for SSL Client --------------------------
certutil -V -n Distrusted -u C -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #420: Verify Distrusted Cert for SSL Client - PASSED
cert.sh: Verify Distrusted Cert for Email signer --------------------------
certutil -V -n Distrusted -u S -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #421: Verify Distrusted Cert for Email signer - PASSED
cert.sh: Verify Distrusted Cert for Email recipient --------------------------
certutil -V -n Distrusted -u R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #422: Verify Distrusted Cert for Email recipient - PASSED
cert.sh: Verify Distrusted Cert for OCSP responder --------------------------
certutil -V -n Distrusted -u O -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust -f ../tests.pw
certutil: certificate is invalid: Certificate type not approved for application.
cert.sh: #423: Verify Distrusted Cert for OCSP responder - PASSED
cert.sh: Verify Distrusted Cert for Object Signer --------------------------
certutil -V -n Distrusted -u J -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/distrust -f ../tests.pw
certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user.
cert.sh: #424: Verify Distrusted Cert for Object Signer - PASSED
cert.sh: OCSP response creation selftest
cert.sh: perform selftest --------------------------
ocspresp /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/serverCA serverCA chain-1-serverCA -f ../tests.pw
cert.sh: #425: perform selftest - PASSED
cert.sh: Creating Client CA Issued Certificates Range 40 - 52 ===
cert.sh: Generate Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #426: Generate Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's Request --------------------------
certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw
cert.sh: #427: Sign TestUser40's Request - PASSED
cert.sh: Import TestUser40's Cert --------------------------
certutil -A -n TestUser40 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser40.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #428: Import TestUser40's Cert - PASSED
cert.sh SUCCESS: TestUser40's Cert Created
cert.sh: Generate DSA Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #429: Generate DSA Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw
cert.sh: #430: Sign TestUser40's DSA Request - PASSED
cert.sh: Import TestUser40's DSA Cert --------------------------
certutil -A -n TestUser40-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser40-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #431: Import TestUser40's DSA Cert - PASSED
cert.sh SUCCESS: TestUser40's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #432: Generate mixed DSA Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw
cert.sh: #433: Sign TestUser40's DSA Request with RSA - PASSED
cert.sh: Import TestUser40's mixed DSA Cert --------------------------
certutil -A -n TestUser40-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser40-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #434: Import TestUser40's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser40's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #435: Generate EC Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's EC Request --------------------------
certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw
cert.sh: #436: Sign TestUser40's EC Request - PASSED
cert.sh: Import TestUser40's EC Cert --------------------------
certutil -A -n TestUser40-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser40-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #437: Import TestUser40's EC Cert - PASSED
cert.sh SUCCESS: TestUser40's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser40 --------------------------
certutil -s "CN=TestUser40, E=TestUser40-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #438: Generate mixed EC Cert Request for TestUser40 - PASSED
cert.sh: Sign TestUser40's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw
cert.sh: #439: Sign TestUser40's EC Request with RSA - PASSED
cert.sh: Import TestUser40's mixed EC Cert --------------------------
certutil -A -n TestUser40-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser40-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #440: Import TestUser40's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser40's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #441: Generate Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's Request --------------------------
certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw
cert.sh: #442: Sign TestUser41's Request - PASSED
cert.sh: Import TestUser41's Cert --------------------------
certutil -A -n TestUser41 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser41.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #443: Import TestUser41's Cert - PASSED
cert.sh SUCCESS: TestUser41's Cert Created
cert.sh: Generate DSA Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #444: Generate DSA Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw
cert.sh: #445: Sign TestUser41's DSA Request - PASSED
cert.sh: Import TestUser41's DSA Cert --------------------------
certutil -A -n TestUser41-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser41-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #446: Import TestUser41's DSA Cert - PASSED
cert.sh SUCCESS: TestUser41's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #447: Generate mixed DSA Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw
cert.sh: #448: Sign TestUser41's DSA Request with RSA - PASSED
cert.sh: Import TestUser41's mixed DSA Cert --------------------------
certutil -A -n TestUser41-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser41-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #449: Import TestUser41's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser41's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #450: Generate EC Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's EC Request --------------------------
certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw
cert.sh: #451: Sign TestUser41's EC Request - PASSED
cert.sh: Import TestUser41's EC Cert --------------------------
certutil -A -n TestUser41-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser41-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #452: Import TestUser41's EC Cert - PASSED
cert.sh SUCCESS: TestUser41's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser41 --------------------------
certutil -s "CN=TestUser41, E=TestUser41-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #453: Generate mixed EC Cert Request for TestUser41 - PASSED
cert.sh: Sign TestUser41's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw
cert.sh: #454: Sign TestUser41's EC Request with RSA - PASSED
cert.sh: Import TestUser41's mixed EC Cert --------------------------
certutil -A -n TestUser41-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser41-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #455: Import TestUser41's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser41's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #456: Generate Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's Request --------------------------
certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw
cert.sh: #457: Sign TestUser42's Request - PASSED
cert.sh: Import TestUser42's Cert --------------------------
certutil -A -n TestUser42 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser42.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #458: Import TestUser42's Cert - PASSED
cert.sh SUCCESS: TestUser42's Cert Created
cert.sh: Generate DSA Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #459: Generate DSA Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw
cert.sh: #460: Sign TestUser42's DSA Request - PASSED
cert.sh: Import TestUser42's DSA Cert --------------------------
certutil -A -n TestUser42-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser42-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #461: Import TestUser42's DSA Cert - PASSED
cert.sh SUCCESS: TestUser42's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #462: Generate mixed DSA Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw
cert.sh: #463: Sign TestUser42's DSA Request with RSA - PASSED
cert.sh: Import TestUser42's mixed DSA Cert --------------------------
certutil -A -n TestUser42-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser42-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #464: Import TestUser42's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser42's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #465: Generate EC Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's EC Request --------------------------
certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw
cert.sh: #466: Sign TestUser42's EC Request - PASSED
cert.sh: Import TestUser42's EC Cert --------------------------
certutil -A -n TestUser42-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser42-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #467: Import TestUser42's EC Cert - PASSED
cert.sh SUCCESS: TestUser42's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser42 --------------------------
certutil -s "CN=TestUser42, E=TestUser42-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #468: Generate mixed EC Cert Request for TestUser42 - PASSED
cert.sh: Sign TestUser42's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw
cert.sh: #469: Sign TestUser42's EC Request with RSA - PASSED
cert.sh: Import TestUser42's mixed EC Cert --------------------------
certutil -A -n TestUser42-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser42-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #470: Import TestUser42's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser42's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #471: Generate Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's Request --------------------------
certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw
cert.sh: #472: Sign TestUser43's Request - PASSED
cert.sh: Import TestUser43's Cert --------------------------
certutil -A -n TestUser43 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser43.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #473: Import TestUser43's Cert - PASSED
cert.sh SUCCESS: TestUser43's Cert Created
cert.sh: Generate DSA Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #474: Generate DSA Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw
cert.sh: #475: Sign TestUser43's DSA Request - PASSED
cert.sh: Import TestUser43's DSA Cert --------------------------
certutil -A -n TestUser43-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser43-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #476: Import TestUser43's DSA Cert - PASSED
cert.sh SUCCESS: TestUser43's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #477: Generate mixed DSA Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw
cert.sh: #478: Sign TestUser43's DSA Request with RSA - PASSED
cert.sh: Import TestUser43's mixed DSA Cert --------------------------
certutil -A -n TestUser43-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser43-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #479: Import TestUser43's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser43's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #480: Generate EC Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's EC Request --------------------------
certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw
cert.sh: #481: Sign TestUser43's EC Request - PASSED
cert.sh: Import TestUser43's EC Cert --------------------------
certutil -A -n TestUser43-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser43-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #482: Import TestUser43's EC Cert - PASSED
cert.sh SUCCESS: TestUser43's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser43 --------------------------
certutil -s "CN=TestUser43, E=TestUser43-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #483: Generate mixed EC Cert Request for TestUser43 - PASSED
cert.sh: Sign TestUser43's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw
cert.sh: #484: Sign TestUser43's EC Request with RSA - PASSED
cert.sh: Import TestUser43's mixed EC Cert --------------------------
certutil -A -n TestUser43-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser43-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #485: Import TestUser43's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser43's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #486: Generate Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's Request --------------------------
certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw
cert.sh: #487: Sign TestUser44's Request - PASSED
cert.sh: Import TestUser44's Cert --------------------------
certutil -A -n TestUser44 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser44.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #488: Import TestUser44's Cert - PASSED
cert.sh SUCCESS: TestUser44's Cert Created
cert.sh: Generate DSA Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #489: Generate DSA Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw
cert.sh: #490: Sign TestUser44's DSA Request - PASSED
cert.sh: Import TestUser44's DSA Cert --------------------------
certutil -A -n TestUser44-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser44-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #491: Import TestUser44's DSA Cert - PASSED
cert.sh SUCCESS: TestUser44's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #492: Generate mixed DSA Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw
cert.sh: #493: Sign TestUser44's DSA Request with RSA - PASSED
cert.sh: Import TestUser44's mixed DSA Cert --------------------------
certutil -A -n TestUser44-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser44-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #494: Import TestUser44's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser44's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #495: Generate EC Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's EC Request --------------------------
certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw
cert.sh: #496: Sign TestUser44's EC Request - PASSED
cert.sh: Import TestUser44's EC Cert --------------------------
certutil -A -n TestUser44-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser44-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #497: Import TestUser44's EC Cert - PASSED
cert.sh SUCCESS: TestUser44's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser44 --------------------------
certutil -s "CN=TestUser44, E=TestUser44-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #498: Generate mixed EC Cert Request for TestUser44 - PASSED
cert.sh: Sign TestUser44's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw
cert.sh: #499: Sign TestUser44's EC Request with RSA - PASSED
cert.sh: Import TestUser44's mixed EC Cert --------------------------
certutil -A -n TestUser44-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser44-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #500: Import TestUser44's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser44's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #501: Generate Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's Request --------------------------
certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw
cert.sh: #502: Sign TestUser45's Request - PASSED
cert.sh: Import TestUser45's Cert --------------------------
certutil -A -n TestUser45 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser45.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #503: Import TestUser45's Cert - PASSED
cert.sh SUCCESS: TestUser45's Cert Created
cert.sh: Generate DSA Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #504: Generate DSA Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw
cert.sh: #505: Sign TestUser45's DSA Request - PASSED
cert.sh: Import TestUser45's DSA Cert --------------------------
certutil -A -n TestUser45-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser45-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #506: Import TestUser45's DSA Cert - PASSED
cert.sh SUCCESS: TestUser45's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #507: Generate mixed DSA Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw
cert.sh: #508: Sign TestUser45's DSA Request with RSA - PASSED
cert.sh: Import TestUser45's mixed DSA Cert --------------------------
certutil -A -n TestUser45-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser45-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #509: Import TestUser45's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser45's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #510: Generate EC Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's EC Request --------------------------
certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw
cert.sh: #511: Sign TestUser45's EC Request - PASSED
cert.sh: Import TestUser45's EC Cert --------------------------
certutil -A -n TestUser45-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser45-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #512: Import TestUser45's EC Cert - PASSED
cert.sh SUCCESS: TestUser45's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser45 --------------------------
certutil -s "CN=TestUser45, E=TestUser45-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #513: Generate mixed EC Cert Request for TestUser45 - PASSED
cert.sh: Sign TestUser45's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw
cert.sh: #514: Sign TestUser45's EC Request with RSA - PASSED
cert.sh: Import TestUser45's mixed EC Cert --------------------------
certutil -A -n TestUser45-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser45-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #515: Import TestUser45's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser45's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #516: Generate Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's Request --------------------------
certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw
cert.sh: #517: Sign TestUser46's Request - PASSED
cert.sh: Import TestUser46's Cert --------------------------
certutil -A -n TestUser46 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser46.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #518: Import TestUser46's Cert - PASSED
cert.sh SUCCESS: TestUser46's Cert Created
cert.sh: Generate DSA Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #519: Generate DSA Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw
cert.sh: #520: Sign TestUser46's DSA Request - PASSED
cert.sh: Import TestUser46's DSA Cert --------------------------
certutil -A -n TestUser46-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser46-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #521: Import TestUser46's DSA Cert - PASSED
cert.sh SUCCESS: TestUser46's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #522: Generate mixed DSA Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw
cert.sh: #523: Sign TestUser46's DSA Request with RSA - PASSED
cert.sh: Import TestUser46's mixed DSA Cert --------------------------
certutil -A -n TestUser46-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser46-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #524: Import TestUser46's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser46's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #525: Generate EC Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's EC Request --------------------------
certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw
cert.sh: #526: Sign TestUser46's EC Request - PASSED
cert.sh: Import TestUser46's EC Cert --------------------------
certutil -A -n TestUser46-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser46-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #527: Import TestUser46's EC Cert - PASSED
cert.sh SUCCESS: TestUser46's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser46 --------------------------
certutil -s "CN=TestUser46, E=TestUser46-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #528: Generate mixed EC Cert Request for TestUser46 - PASSED
cert.sh: Sign TestUser46's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw
cert.sh: #529: Sign TestUser46's EC Request with RSA - PASSED
cert.sh: Import TestUser46's mixed EC Cert --------------------------
certutil -A -n TestUser46-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser46-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #530: Import TestUser46's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser46's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #531: Generate Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's Request --------------------------
certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw
cert.sh: #532: Sign TestUser47's Request - PASSED
cert.sh: Import TestUser47's Cert --------------------------
certutil -A -n TestUser47 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser47.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #533: Import TestUser47's Cert - PASSED
cert.sh SUCCESS: TestUser47's Cert Created
cert.sh: Generate DSA Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #534: Generate DSA Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw
cert.sh: #535: Sign TestUser47's DSA Request - PASSED
cert.sh: Import TestUser47's DSA Cert --------------------------
certutil -A -n TestUser47-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser47-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #536: Import TestUser47's DSA Cert - PASSED
cert.sh SUCCESS: TestUser47's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #537: Generate mixed DSA Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw
cert.sh: #538: Sign TestUser47's DSA Request with RSA - PASSED
cert.sh: Import TestUser47's mixed DSA Cert --------------------------
certutil -A -n TestUser47-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser47-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #539: Import TestUser47's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser47's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #540: Generate EC Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's EC Request --------------------------
certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw
cert.sh: #541: Sign TestUser47's EC Request - PASSED
cert.sh: Import TestUser47's EC Cert --------------------------
certutil -A -n TestUser47-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser47-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #542: Import TestUser47's EC Cert - PASSED
cert.sh SUCCESS: TestUser47's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser47 --------------------------
certutil -s "CN=TestUser47, E=TestUser47-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #543: Generate mixed EC Cert Request for TestUser47 - PASSED
cert.sh: Sign TestUser47's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw
cert.sh: #544: Sign TestUser47's EC Request with RSA - PASSED
cert.sh: Import TestUser47's mixed EC Cert --------------------------
certutil -A -n TestUser47-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser47-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #545: Import TestUser47's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser47's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #546: Generate Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's Request --------------------------
certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw
cert.sh: #547: Sign TestUser48's Request - PASSED
cert.sh: Import TestUser48's Cert --------------------------
certutil -A -n TestUser48 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser48.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #548: Import TestUser48's Cert - PASSED
cert.sh SUCCESS: TestUser48's Cert Created
cert.sh: Generate DSA Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #549: Generate DSA Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw
cert.sh: #550: Sign TestUser48's DSA Request - PASSED
cert.sh: Import TestUser48's DSA Cert --------------------------
certutil -A -n TestUser48-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser48-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #551: Import TestUser48's DSA Cert - PASSED
cert.sh SUCCESS: TestUser48's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #552: Generate mixed DSA Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw
cert.sh: #553: Sign TestUser48's DSA Request with RSA - PASSED
cert.sh: Import TestUser48's mixed DSA Cert --------------------------
certutil -A -n TestUser48-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser48-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #554: Import TestUser48's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser48's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #555: Generate EC Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's EC Request --------------------------
certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw
cert.sh: #556: Sign TestUser48's EC Request - PASSED
cert.sh: Import TestUser48's EC Cert --------------------------
certutil -A -n TestUser48-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser48-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #557: Import TestUser48's EC Cert - PASSED
cert.sh SUCCESS: TestUser48's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser48 --------------------------
certutil -s "CN=TestUser48, E=TestUser48-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #558: Generate mixed EC Cert Request for TestUser48 - PASSED
cert.sh: Sign TestUser48's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw
cert.sh: #559: Sign TestUser48's EC Request with RSA - PASSED
cert.sh: Import TestUser48's mixed EC Cert --------------------------
certutil -A -n TestUser48-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser48-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #560: Import TestUser48's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser48's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #561: Generate Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's Request --------------------------
certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw
cert.sh: #562: Sign TestUser49's Request - PASSED
cert.sh: Import TestUser49's Cert --------------------------
certutil -A -n TestUser49 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser49.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #563: Import TestUser49's Cert - PASSED
cert.sh SUCCESS: TestUser49's Cert Created
cert.sh: Generate DSA Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #564: Generate DSA Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw
cert.sh: #565: Sign TestUser49's DSA Request - PASSED
cert.sh: Import TestUser49's DSA Cert --------------------------
certutil -A -n TestUser49-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser49-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #566: Import TestUser49's DSA Cert - PASSED
cert.sh SUCCESS: TestUser49's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #567: Generate mixed DSA Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw
cert.sh: #568: Sign TestUser49's DSA Request with RSA - PASSED
cert.sh: Import TestUser49's mixed DSA Cert --------------------------
certutil -A -n TestUser49-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser49-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #569: Import TestUser49's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser49's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #570: Generate EC Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's EC Request --------------------------
certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw
cert.sh: #571: Sign TestUser49's EC Request - PASSED
cert.sh: Import TestUser49's EC Cert --------------------------
certutil -A -n TestUser49-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser49-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #572: Import TestUser49's EC Cert - PASSED
cert.sh SUCCESS: TestUser49's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser49 --------------------------
certutil -s "CN=TestUser49, E=TestUser49-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #573: Generate mixed EC Cert Request for TestUser49 - PASSED
cert.sh: Sign TestUser49's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw
cert.sh: #574: Sign TestUser49's EC Request with RSA - PASSED
cert.sh: Import TestUser49's mixed EC Cert --------------------------
certutil -A -n TestUser49-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser49-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #575: Import TestUser49's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser49's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #576: Generate Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's Request --------------------------
certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw
cert.sh: #577: Sign TestUser50's Request - PASSED
cert.sh: Import TestUser50's Cert --------------------------
certutil -A -n TestUser50 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser50.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #578: Import TestUser50's Cert - PASSED
cert.sh SUCCESS: TestUser50's Cert Created
cert.sh: Generate DSA Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #579: Generate DSA Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw
cert.sh: #580: Sign TestUser50's DSA Request - PASSED
cert.sh: Import TestUser50's DSA Cert --------------------------
certutil -A -n TestUser50-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser50-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #581: Import TestUser50's DSA Cert - PASSED
cert.sh SUCCESS: TestUser50's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #582: Generate mixed DSA Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw
cert.sh: #583: Sign TestUser50's DSA Request with RSA - PASSED
cert.sh: Import TestUser50's mixed DSA Cert --------------------------
certutil -A -n TestUser50-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser50-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #584: Import TestUser50's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser50's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #585: Generate EC Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's EC Request --------------------------
certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw
cert.sh: #586: Sign TestUser50's EC Request - PASSED
cert.sh: Import TestUser50's EC Cert --------------------------
certutil -A -n TestUser50-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser50-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #587: Import TestUser50's EC Cert - PASSED
cert.sh SUCCESS: TestUser50's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser50 --------------------------
certutil -s "CN=TestUser50, E=TestUser50-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #588: Generate mixed EC Cert Request for TestUser50 - PASSED
cert.sh: Sign TestUser50's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw
cert.sh: #589: Sign TestUser50's EC Request with RSA - PASSED
cert.sh: Import TestUser50's mixed EC Cert --------------------------
certutil -A -n TestUser50-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser50-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #590: Import TestUser50's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser50's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #591: Generate Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's Request --------------------------
certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw
cert.sh: #592: Sign TestUser51's Request - PASSED
cert.sh: Import TestUser51's Cert --------------------------
certutil -A -n TestUser51 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser51.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #593: Import TestUser51's Cert - PASSED
cert.sh SUCCESS: TestUser51's Cert Created
cert.sh: Generate DSA Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #594: Generate DSA Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw
cert.sh: #595: Sign TestUser51's DSA Request - PASSED
cert.sh: Import TestUser51's DSA Cert --------------------------
certutil -A -n TestUser51-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser51-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #596: Import TestUser51's DSA Cert - PASSED
cert.sh SUCCESS: TestUser51's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #597: Generate mixed DSA Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw
cert.sh: #598: Sign TestUser51's DSA Request with RSA - PASSED
cert.sh: Import TestUser51's mixed DSA Cert --------------------------
certutil -A -n TestUser51-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser51-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #599: Import TestUser51's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser51's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #600: Generate EC Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's EC Request --------------------------
certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw
cert.sh: #601: Sign TestUser51's EC Request - PASSED
cert.sh: Import TestUser51's EC Cert --------------------------
certutil -A -n TestUser51-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser51-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #602: Import TestUser51's EC Cert - PASSED
cert.sh SUCCESS: TestUser51's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser51 --------------------------
certutil -s "CN=TestUser51, E=TestUser51-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #603: Generate mixed EC Cert Request for TestUser51 - PASSED
cert.sh: Sign TestUser51's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw
cert.sh: #604: Sign TestUser51's EC Request with RSA - PASSED
cert.sh: Import TestUser51's mixed EC Cert --------------------------
certutil -A -n TestUser51-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser51-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #605: Import TestUser51's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser51's mixed EC Cert Created
cert.sh: Generate Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #606: Generate Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's Request --------------------------
certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw
cert.sh: #607: Sign TestUser52's Request - PASSED
cert.sh: Import TestUser52's Cert --------------------------
certutil -A -n TestUser52 -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser52.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #608: Import TestUser52's Cert - PASSED
cert.sh SUCCESS: TestUser52's Cert Created
cert.sh: Generate DSA Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-dsa@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #609: Generate DSA Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's DSA Request --------------------------
certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw
cert.sh: #610: Sign TestUser52's DSA Request - PASSED
cert.sh: Import TestUser52's DSA Cert --------------------------
certutil -A -n TestUser52-dsa -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser52-dsa.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #611: Import TestUser52's DSA Cert - PASSED
cert.sh SUCCESS: TestUser52's DSA Cert Created
cert.sh: Generate mixed DSA Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-dsamixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #612: Generate mixed DSA Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's DSA Request with RSA --------------------------
certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw
cert.sh: #613: Sign TestUser52's DSA Request with RSA - PASSED
cert.sh: Import TestUser52's mixed DSA Cert --------------------------
certutil -A -n TestUser52-dsamixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser52-dsamixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #614: Import TestUser52's mixed DSA Cert - PASSED
cert.sh SUCCESS: TestUser52's mixed DSA Cert Created
cert.sh: Generate EC Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-ec@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #615: Generate EC Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's EC Request --------------------------
certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw
cert.sh: #616: Sign TestUser52's EC Request - PASSED
cert.sh: Import TestUser52's EC Cert --------------------------
certutil -A -n TestUser52-ec -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser52-ec.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #617: Import TestUser52's EC Cert - PASSED
cert.sh SUCCESS: TestUser52's EC Cert Created
cert.sh: Generate mixed EC Cert Request for TestUser52 --------------------------
certutil -s "CN=TestUser52, E=TestUser52-ecmixed@bogus.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -z ../tests_noise -o req
Generating key. This may take a few moments...
cert.sh: #618: Generate mixed EC Cert Request for TestUser52 - PASSED
cert.sh: Sign TestUser52's EC Request with RSA --------------------------
certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw
cert.sh: #619: Sign TestUser52's EC Request with RSA - PASSED
cert.sh: Import TestUser52's mixed EC Cert --------------------------
certutil -A -n TestUser52-ecmixed -t u,u,u -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/client -f ../tests.pw -i TestUser52-ecmixed.cert
Notice: Trust flag u is set automatically if the private key is present.
cert.sh: #620: Import TestUser52's mixed EC Cert - PASSED
cert.sh SUCCESS: TestUser52's mixed EC Cert Created
cert.sh: Creating CA CRL =====================================
cert.sh: Generating CRL for range 40-42 TestCA authority --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or
cert.sh: #621: Generating CRL for range 40-42 TestCA authority - PASSED
cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority --------------------------
crlutil -q -q -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa
cert.sh: #622: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED
cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority --------------------------
crlutil -q -q -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec
cert.sh: #623: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED
cert.sh: Modifying CA CRL by adding one more cert ============
cert.sh: Modify CRL by adding one more cert --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or
cert.sh: #624: Modify CRL by adding one more cert - PASSED
cert.sh: Modify CRL (DSA) by adding one more cert --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa
cert.sh: #625: Modify CRL (DSA) by adding one more cert - PASSED
cert.sh: Modify CRL (ECC) by adding one more cert --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec
cert.sh: #626: Modify CRL (ECC) by adding one more cert - PASSED
cert.sh: Modifying CA CRL by removing one cert ===============
cert.sh: Modify CRL by removing one cert --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1
cert.sh: #627: Modify CRL by removing one cert - PASSED
cert.sh: Modify CRL (DSA) by removing one cert --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1
cert.sh: #628: Modify CRL (DSA) by removing one cert - PASSED
cert.sh: Modify CRL (ECC) by removing one cert --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec
cert.sh: #629: Modify CRL (ECC) by removing one cert - PASSED
cert.sh: Creating CA CRL for groups 1 and 2 ===============
cert.sh: Creating CRL for groups 1 and 2 --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42
cert.sh: #630: Creating CRL for groups 1 and 2 - PASSED
cert.sh: Creating CRL (ECC) for groups 1 and 2 --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec
cert.sh: #631: Creating CRL (ECC) for groups 1 and 2 - PASSED
cert.sh: Creating CA CRL for groups 1, 2 and 3 ===============
cert.sh: Creating CRL for groups 1, 2 and 3 --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48
cert.sh: #632: Creating CRL for groups 1, 2 and 3 - PASSED
cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 --------------------------
crlutil -q -d /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec
cert.sh: #633: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED
cert.sh: Importing Server CA Issued CRL for certs trough 52
cert.sh: Importing CRL for groups 1 --------------------------
crlutil -q -D -n TestCA -f ../tests.pw -d ../server
crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found.
crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found.
cert.sh: #634: Importing CRL for groups 1 - PASSED
cert.sh: Importing CRL for groups 1 --------------------------
crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server
cert.sh: #635: Importing CRL for groups 1 - PASSED
cert.sh: Importing CRL (ECC) for groups 1 --------------------------
crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server
crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found.
crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found.
cert.sh: #636: Importing CRL (ECC) for groups 1 - PASSED
cert.sh: Importing CRL (ECC) for groups 1 --------------------------
crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server
cert.sh: #637: Importing CRL (ECC) for groups 1 - PASSED
cert.sh SUCCESS: SSL CRL prep passed
cert.sh cert.sh: finished cert.sh
TIMESTAMP cert END: Wed May 31 23:11:04 UTC 2017
Running tests for dbtests
TIMESTAMP dbtests BEGIN: Wed May 31 23:11:04 UTC 2017
dbtests.sh: CERT and Key DB Tests ===============================
---------------------------------------------------------------
| test opening the database read/write in a nonexisting directory
---------------------------------------------------------------
certutil: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format.
dbtests.sh: #638: Certutil didn't work in a nonexisting dir 255 - PASSED
dbdir selected is ./non_existent_dir
ERROR: Directory "./non_existent_dir" does not exist.
dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format.
dbtests.sh: #639: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED
---------------------------------------------------------------
| test force opening the database in a nonexisting directory
---------------------------------------------------------------
dbdir selected is ./non_existent_dir
ERROR: Directory "./non_existent_dir" does not exist.
dbtests.sh: #640: Dbtest force succeeded in a nonexisting dir 0 - PASSED
---------------------------------------------------------------
| test opening the database readonly in an empty directory
---------------------------------------------------------------
tstclnt: unable to open cert database: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format.
dbtests.sh: #641: Tstclnt didn't work in an empty dir 1 - PASSED
dbdir selected is /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/emptydir
database checked is /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/emptydir/secmod.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/emptydir/secmod.db" does not exist.
database checked is /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/emptydir/cert8.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/emptydir/cert8.db" does not exist.
database checked is /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/emptydir/key3.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/emptydir/key3.db" does not exist.
dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format.
dbtests.sh: #642: Dbtest readonly didn't work in an empty dir 46 - PASSED
dbdir selected is /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/emptydir
dbtests.sh: #643: Dbtest logout after empty DB Init has key - PASSED
dbdir selected is /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/emptydir
dbtests.sh: #644: Dbtest password DB Init maintains needlogin state - PASSED
certutil: could not find certificate named "xxxx": SEC_ERROR_BAD_DATABASE: security library: bad database.
dbtests.sh: #645: Certutil didn't work in an empty dir 255 - PASSED
---------------------------------------------------------------
| test force opening the database readonly in a empty directory
---------------------------------------------------------------
dbdir selected is /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/emptydir
database checked is /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/emptydir/secmod.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/emptydir/secmod.db" does not exist.
database checked is /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/emptydir/cert8.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/emptydir/cert8.db" does not exist.
database checked is /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/emptydir/key3.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/emptydir/key3.db" does not exist.
dbtests.sh: #646: Dbtest force readonly succeeded in an empty dir 0 - PASSED
---------------------------------------------------------------
| test opening the database r/w in a readonly directory
---------------------------------------------------------------
dbdir selected is /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir
ERROR: Directory "/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir" is not writeable.
database checked is /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir/secmod.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir/secmod.db" is not writeable.
database checked is /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir/cert8.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir/cert8.db" is not writeable.
database checked is /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir/key3.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir/key3.db" is not writeable.
dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format.
dbtests.sh: #647: Dbtest r/w didn't work in an readonly dir 46 - PASSED
certutil: could not find certificate named "TestUser": SEC_ERROR_BAD_DATABASE: security library: bad database.
dbtests.sh: #648: Certutil didn't work in an readonly dir 255 - PASSED
---------------------------------------------------------------
| test opening the database ronly in a readonly directory
---------------------------------------------------------------
dbdir selected is /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir
database checked is /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir/secmod.db
database checked is /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir/cert8.db
database checked is /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir/key3.db
dbtests.sh: #649: Dbtest readonly succeeded in a readonly dir 0 - PASSED
---------------------------------------------------------------
| test force opening the database r/w in a readonly directory
---------------------------------------------------------------
dbdir selected is /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir
ERROR: Directory "/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir" is not writeable.
database checked is /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir/secmod.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir/secmod.db" is not writeable.
database checked is /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir/cert8.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir/cert8.db" is not writeable.
database checked is /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir/key3.db
ERROR: File "/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir/key3.db" is not writeable.
dbtests.sh: #650: Dbtest force succeeded in a readonly dir 0 - PASSED
---------------------------------------------------------------
| ls -l /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir
---------------------------------------------------------------
dr-xr-xr-x 1 buildd buildd 232 May 31 23:11 /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir
-r--r----- 1 buildd buildd 1222 May 31 23:11 /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir/TestUser-dsa.cert
-r--r----- 1 buildd buildd 1424 May 31 23:11 /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir/TestUser-dsamixed.cert
-r--r----- 1 buildd buildd 578 May 31 23:11 /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir/TestUser-ec.cert
-r--r----- 1 buildd buildd 705 May 31 23:11 /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir/TestUser-ecmixed.cert
-r--r----- 1 buildd buildd 870 May 31 23:11 /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir/TestUser.cert
-r-------- 1 buildd buildd 229376 May 31 23:11 /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir/cert8.db
-r-------- 1 buildd buildd 110592 May 31 23:11 /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir/key3.db
-r--r----- 1 buildd buildd 393 May 31 23:11 /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir/req
-r-------- 1 buildd buildd 16384 May 31 23:11 /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ronlydir/secmod.db
---------------------------------------------------------------
| test creating a new cert with a conflicting nickname
---------------------------------------------------------------
/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/conflictdir
certutil: could not add certificate to token or database: SEC_ERROR_ADDING_CERT: Error adding certificate to database.
dbtests.sh: #651: Nicknane conflict test, could not import conflict nickname 255 - PASSED
---------------------------------------------------------------
| test importing an old cert to a conflicting nickname
---------------------------------------------------------------
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 40 (0x28)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:27 2017
Not After : Tue May 31 23:02:27 2022
Subject: "CN=Bob,E=Bob@bogus.com,O=BOGUS NSS,L=Mountain View,ST=Calif
ornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
d0:52:cc:74:a1:5e:66:98:69:69:c5:b9:1e:57:c5:dd:
f1:36:a2:38:5e:ad:d8:9f:80:e6:c3:02:60:3b:75:f6:
eb:c8:f8:34:87:97:6b:78:1e:bb:1c:ce:6b:f0:3c:97:
1b:57:b8:a1:dc:48:a2:8c:af:92:14:f3:89:11:c3:ad:
df:dc:52:48:a6:72:45:fe:10:2d:42:e3:1f:a1:01:25:
0f:43:e1:52:29:a6:68:4a:62:d6:82:95:ea:7d:e1:ae:
10:c5:7b:3e:5f:09:b8:11:22:30:e1:69:51:3d:ea:90:
fb:96:07:f5:07:7b:0f:5f:a8:e0:f6:c8:2e:70:18:56:
aa:55:a4:b0:9b:5d:b6:5d:9b:45:74:fa:dd:61:de:62:
44:58:76:26:dc:72:71:2a:97:da:c9:be:72:f0:2a:f2:
c5:f2:d5:97:0a:53:b6:2b:ab:de:c8:c0:6d:c0:a4:b9:
bd:4c:00:40:50:a9:3e:4c:27:0d:f4:75:eb:c3:b3:f1:
21:3e:f9:23:4e:ee:44:36:f4:ff:a4:a0:82:51:40:84:
86:1d:30:c3:01:32:00:18:f4:38:ca:e6:37:e7:9c:16:
1b:65:69:2c:91:bf:4e:74:b1:16:d9:b7:67:a0:46:6f:
77:97:92:c1:74:72:19:4f:d8:b1:f2:ba:cd:95:91:2b
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
b2:af:b8:be:c0:6c:0b:ab:57:96:b6:a5:7a:08:c4:a4:
b6:5d:e6:6d:05:6b:ba:92:c5:57:00:53:4f:e7:ec:5e:
5b:b5:8f:e0:36:e8:b4:26:3f:17:45:37:2a:11:10:06:
9d:86:eb:77:ff:56:ec:47:87:27:e4:32:d0:83:90:d2:
d9:38:71:79:c8:12:0b:cb:35:ea:9b:cb:ab:8c:37:28:
d9:6b:b2:6c:df:5b:80:a5:00:49:f7:c3:67:59:69:f5:
f3:a2:8a:ef:d6:a2:84:bb:11:69:fd:27:02:bc:bf:b6:
4a:cb:ba:7e:b8:a8:c8:48:fd:0b:77:12:1c:25:81:42:
7d:28:a5:15:00:e4:28:a3:0e:61:bc:32:ec:2c:22:31:
14:e5:85:46:2d:fb:b7:dd:01:96:1d:45:1b:eb:c1:28:
c2:8b:14:cd:54:7d:eb:0d:14:8a:19:8c:b3:11:a1:da:
e4:c3:d7:6d:08:5a:6f:c7:57:e1:3a:92:34:08:86:17:
2f:34:82:69:3f:e6:ea:09:6b:a1:64:05:c3:64:5a:b4:
3c:3b:57:1c:6b:fd:94:74:85:54:b3:42:a8:d8:fc:af:
b1:e6:f9:d7:95:23:5e:b8:14:91:f8:38:e6:e8:b0:bd:
a4:55:7c:37:5e:1e:ef:e6:97:97:15:a2:1c:e0:3c:1b
Fingerprint (SHA-256):
23:30:50:21:80:F2:26:62:24:99:2F:99:DF:03:D7:86:C1:86:9F:D2:1F:89:A9:C3:6B:D9:05:3A:E6:0E:B1:E4
Fingerprint (SHA1):
0F:98:CB:1B:C5:52:04:49:09:96:59:9B:87:0D:06:00:27:2C:67:69
Certificate Trust Flags:
SSL Flags:
Email Flags:
Object Signing Flags:
dbtests.sh: #652: Nicknane conflict test-setting nickname conflict was correctly rejected - PASSED
TIMESTAMP dbtests END: Wed May 31 23:11:06 UTC 2017
Running tests for tools
TIMESTAMP tools BEGIN: Wed May 31 23:11:06 UTC 2017
tools.sh: Tools Tests with ECC ===============================
tools.sh: Exporting Alice's email cert & key - default ciphers
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #653: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
a1:7b:c9:fe:1a:21:2e:9f:70:83:fd:32:74:82:dd:55
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #654: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #655: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's email EC cert & key---------------
pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \
-w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #656: Exporting Alice's email EC cert & key (pk12util -o) - PASSED
tools.sh: Importing Alice's email EC cert & key --------------
pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #657: Importing Alice's email EC cert & key (pk12util -i) - PASSED
tools.sh: Listing Alice's pk12 EC file -----------------
pk12util -l Alice-ec.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice-ec
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
1b:03:70:55:c8:00:a6:7b:a3:9f:07:c4:f4:82:a4:77
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: X9.62 ECDSA signature with SHA-1
Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
ia,C=US"
Validity:
Not Before: Wed May 31 23:01:16 2017
Not After : Tue May 31 23:01:16 2067
Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor
nia,C=US"
Subject Public Key Info:
Public Key Algorithm: X9.62 elliptic curve public key
Args:
06:05:2b:81:04:00:23
EC Public Key:
PublicValue:
04:00:04:61:01:12:ea:fe:3f:bc:8c:3a:a2:3c:ad:85:
60:05:02:5a:c9:80:21:91:bd:d6:62:6e:07:44:b0:65:
47:15:9b:06:9b:2d:93:ad:07:2f:82:34:13:75:b7:ed:
5e:30:5c:2e:c0:fd:df:41:f2:79:47:29:42:bf:3d:34:
ea:41:02:00:ea:a6:3f:7e:79:46:23:8d:53:f6:74:b9:
06:c3:a8:46:8d:df:95:ce:3f:24:a1:9a:5f:58:fb:89:
ce:8d:68:b6:85:00:1a:2a:1f:9b:ad:a1:de:8b:c0:86:
54:1b:25:5a:09:c7:6a:1e:11:eb:b6:f2:4d:ab:b3:41:
fe:fb:68:65:e5
Curve: SECG elliptic curve secp521r1 (aka NIST P-521)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: X9.62 ECDSA signature with SHA-1
Signature:
30:81:88:02:42:01:b1:5b:58:73:fc:7a:61:bf:36:7f:
72:0c:57:a5:51:f1:ed:23:31:03:dd:7d:6d:c7:34:b1:
35:30:b4:31:32:8d:9d:e6:5f:0c:a5:56:b4:c8:e8:ae:
db:8c:e7:5c:47:90:84:0f:b7:4c:3b:6c:32:ac:8d:77:
81:f8:1c:69:54:09:cc:02:42:00:a5:71:b0:48:c5:94:
9d:8c:ff:55:62:5f:33:98:9b:dc:ee:1c:f1:e8:8b:f7:
7f:f7:97:62:14:3a:c3:0e:71:9a:b4:ec:96:f9:e6:1b:
74:f9:3f:9f:ed:2f:1f:ad:85:18:e0:6d:d0:d0:a8:cd:
a4:fd:8d:d4:df:d4:3a:36:7c:03:e5
Fingerprint (SHA-256):
EB:0F:8A:D9:F8:86:1F:57:EE:6B:8E:EE:2A:27:CE:51:1F:E9:A5:D0:61:36:33:C9:3F:98:21:08:48:02:B3:61
Fingerprint (SHA1):
27:E2:D3:4A:50:C7:21:B9:70:5A:88:66:5B:92:D2:E2:52:0E:D8:8B
Friendly Name: TestCA-ec
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: X9.62 ECDSA signature with SHA-1
Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ
ia,C=US"
Validity:
Not Before: Wed May 31 23:02:23 2017
Not After : Tue May 31 23:02:23 2022
Subject: "CN=Alice,E=Alice-ec@bogus.com,O=BOGUS NSS,L=Mountain View,S
T=California,C=US"
Subject Public Key Info:
Public Key Algorithm: X9.62 elliptic curve public key
Args:
06:05:2b:81:04:00:22
EC Public Key:
PublicValue:
04:94:23:32:5c:14:09:13:3a:c3:33:c5:c9:e2:ab:98:
75:f2:1c:b1:de:cc:e8:81:bd:a6:0c:8f:8a:1d:9d:7b:
50:c6:49:4b:61:4d:eb:76:3b:3c:5d:8e:e4:07:62:be:
a9:8b:28:92:6a:6f:33:c9:e3:76:cc:93:ad:f0:31:5f:
d2:69:77:97:43:4d:26:f8:f1:55:24:6b:76:7c:89:0b:
65:21:66:e6:62:db:7b:68:32:23:38:c6:90:a4:cb:54:
4a
Curve: SECG elliptic curve secp384r1 (aka NIST P-384)
Signature Algorithm: X9.62 ECDSA signature with SHA-1
Signature:
30:81:87:02:42:00:e0:9d:91:b3:95:b4:e3:4c:7a:ed:
5d:42:2c:97:8e:fd:8a:97:83:f4:e9:23:7c:55:c9:be:
c0:10:b3:b4:62:4e:d3:63:49:17:0f:81:59:9b:75:f1:
c9:e7:56:8c:16:17:09:96:64:1f:40:c1:50:f4:af:5f:
28:63:9f:63:71:3e:62:02:41:78:fe:f1:34:b2:fb:d8:
b2:59:36:1c:bc:fc:59:47:28:23:4c:fa:e0:6a:f9:ef:
a6:0d:21:34:e8:4c:91:8e:dc:3d:98:00:b7:dd:e8:57:
2c:d6:e5:95:05:9d:6a:9d:c9:67:d5:2e:43:25:22:f1:
86:e5:bb:54:fd:7f:88:8f:5e:2e
Fingerprint (SHA-256):
DC:9C:3C:A0:28:0B:FB:0A:7A:35:FC:1F:BF:8C:B3:6A:72:81:B6:5B:5C:87:11:7F:5E:4E:ED:1E:C7:9B:01:DD
Fingerprint (SHA1):
71:50:8A:4C:6D:B7:FA:E1:3E:42:E6:9C:0D:91:A7:94:FD:7A:27:EC
Friendly Name: Alice-ec
tools.sh: #658: Listing Alice's pk12 EC file (pk12util -l) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c RC2-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #659: Exporting with [RC2-CBC:RC2-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
Parameters:
Salt:
ca:00:78:a0:d7:16:7a:db:94:0a:22:30:a7:d9:2b:24
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #660: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #661: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c RC2-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #662: Exporting with [RC2-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
Parameters:
Salt:
a7:3c:1b:29:8f:fd:4f:63:2d:9a:3a:14:15:46:18:be
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #663: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #664: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c RC2-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #665: Exporting with [RC2-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC
Parameters:
Salt:
28:fd:9b:65:81:0b:24:35:8b:fa:f3:e4:9f:b1:2c:8d
Iteration Count: 2000 (0x7d0)
tools.sh: #666: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #667: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #668: Exporting with [DES-EDE3-CBC:RC2-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
94:a5:34:dc:86:23:c7:c6:bd:f1:be:68:f7:e7:a9:ab
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #669: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #670: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #671: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
6a:01:77:25:21:89:78:4e:30:95:cc:10:16:1f:d7:1f
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #672: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #673: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c DES-EDE3-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #674: Exporting with [DES-EDE3-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
12:a4:68:7b:de:b8:77:af:5e:75:48:3d:dc:b5:07:33
Iteration Count: 2000 (0x7d0)
tools.sh: #675: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #676: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c AES-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #677: Exporting with [AES-128-CBC:RC2-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
55:44:63:89:a8:62:e8:88:d5:e2:cf:ba:7d:a2:8c:e3
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: AES-128-CBC
Args:
04:10:b2:c7:91:ab:96:03:85:96:78:60:77:ed:31:f8:
b1:a8
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #678: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #679: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c AES-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #680: Exporting with [AES-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
8c:06:0d:19:65:0e:81:94:3b:65:fc:f3:62:6c:42:18
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: AES-128-CBC
Args:
04:10:2e:1e:11:73:d4:4f:cc:8b:93:89:ab:41:cd:ee:
0f:5e
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #681: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #682: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c AES-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #683: Exporting with [AES-128-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
59:b8:cc:af:32:c2:8c:38:fb:b6:e7:a8:a7:f3:6a:c6
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: AES-128-CBC
Args:
04:10:ca:11:d2:fe:76:d5:34:95:85:98:0c:1a:d2:25:
a6:cd
tools.sh: #684: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #685: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c AES-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #686: Exporting with [AES-192-CBC:RC2-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
d8:6f:c3:72:cb:fa:34:9a:34:7a:a5:bc:e0:69:52:8d
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: AES-192-CBC
Args:
04:10:f7:ed:63:95:ed:cf:0d:d7:cb:ea:8a:5b:f7:0c:
e4:4f
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #687: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #688: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c AES-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #689: Exporting with [AES-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
f0:97:8f:31:e8:6d:75:07:80:db:08:ad:92:4b:9b:fe
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: AES-192-CBC
Args:
04:10:4b:1d:cf:bb:08:d4:d3:6b:da:23:06:1c:b9:37:
ce:7e
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #690: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #691: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c AES-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #692: Exporting with [AES-192-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
37:9e:b3:2f:47:60:22:b8:42:1f:06:ee:61:63:18:30
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: AES-192-CBC
Args:
04:10:97:92:65:61:b0:ba:ca:34:45:c1:40:e1:d4:5c:
bf:4b
tools.sh: #693: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #694: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c AES-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #695: Exporting with [AES-256-CBC:RC2-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
27:7d:7c:02:97:cc:0e:d5:3e:85:ca:64:8e:96:09:28
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: AES-256-CBC
Args:
04:10:86:fb:0f:05:7e:b6:04:02:2e:7f:2a:d4:70:86:
2d:04
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #696: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #697: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c AES-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #698: Exporting with [AES-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
b1:99:e0:ba:b3:ef:11:9b:9b:8e:4b:e8:5e:7e:c8:26
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: AES-256-CBC
Args:
04:10:08:83:9e:cb:f4:f4:14:53:7d:b9:12:b2:e6:0f:
d8:d2
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #699: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #700: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c AES-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #701: Exporting with [AES-256-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
3b:60:0d:8d:58:76:bb:4d:55:40:37:4c:9c:7d:a9:6d
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: AES-256-CBC
Args:
04:10:ac:4c:10:19:ef:35:c1:4a:cd:e4:e8:3d:28:5f:
f7:cb
tools.sh: #702: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #703: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #704: Exporting with [CAMELLIA-128-CBC:RC2-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
99:10:93:5b:ea:cc:77:e4:4a:34:8e:de:c2:42:9d:9b
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: CAMELLIA-128-CBC
Args:
04:10:7c:98:26:dc:e6:02:11:13:61:2f:db:89:da:fa:
f0:e6
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #705: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #706: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #707: Exporting with [CAMELLIA-128-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
92:52:8d:04:2d:38:aa:c5:70:de:86:61:fd:23:14:ab
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: CAMELLIA-128-CBC
Args:
04:10:df:15:56:c9:68:77:e6:ca:5a:15:46:12:5b:82:
ad:9c
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #708: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #709: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c CAMELLIA-128-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #710: Exporting with [CAMELLIA-128-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
bb:80:7d:7a:7b:18:fb:34:0c:67:e1:57:28:2a:26:ab
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: CAMELLIA-128-CBC
Args:
04:10:ba:85:79:97:3b:b9:4d:15:1d:b3:c0:f9:8e:94:
e1:31
tools.sh: #711: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #712: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #713: Exporting with [CAMELLIA-192-CBC:RC2-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
97:08:93:cb:af:df:c0:0f:b6:2b:20:e4:78:88:80:77
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: CAMELLIA-192-CBC
Args:
04:10:86:dd:bc:1e:c1:b8:73:88:7b:1b:65:02:b7:52:
ec:05
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #714: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #715: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #716: Exporting with [CAMELLIA-192-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
a6:7c:71:06:a4:c8:0e:dd:a1:49:41:e2:78:e3:08:ae
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: CAMELLIA-192-CBC
Args:
04:10:a6:5a:27:83:77:68:a0:b2:56:a6:f8:1e:a1:47:
a1:af
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #717: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #718: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c CAMELLIA-192-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #719: Exporting with [CAMELLIA-192-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
6b:0f:81:ba:84:3b:1c:67:40:88:cd:55:7e:88:f5:ec
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: CAMELLIA-192-CBC
Args:
04:10:dc:77:82:c7:08:0c:54:57:40:53:13:21:46:9f:
6a:01
tools.sh: #720: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #721: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C RC2-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #722: Exporting with [CAMELLIA-256-CBC:RC2-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
c8:56:f5:58:fa:c0:49:38:f4:50:87:dc:56:ad:76:71
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: CAMELLIA-256-CBC
Args:
04:10:50:d9:eb:c4:b3:2c:c0:52:48:d9:6f:d6:6d:a2:
76:37
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #723: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #724: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C DES-EDE3-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #725: Exporting with [CAMELLIA-256-CBC:DES-EDE3-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
28:4f:6c:0e:b0:51:b3:83:87:0e:18:3f:6f:8e:e0:d4
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: CAMELLIA-256-CBC
Args:
04:10:e2:16:15:a5:32:7f:9e:f7:c6:ed:2b:19:b8:29:
b0:2e
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #726: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #727: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c CAMELLIA-256-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #728: Exporting with [CAMELLIA-256-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption v2
Encryption:
KDF: PKCS #5 Password Based Key Dervive Function v2
Parameters:
Salt:
b8:22:d4:fb:f3:45:bc:f9:76:b4:61:e2:a2:dc:65:fe
Iteration Count: 2000 (0x7d0)
Key Length: 32 (0x20)
KDF algorithm: HMAC SHA-1
Cipher: CAMELLIA-256-CBC
Args:
04:10:36:69:d8:75:aa:9d:38:75:11:ec:ce:dc:dc:a4:
e0:31
tools.sh: #729: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #730: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #731: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
Parameters:
Salt:
38:be:cf:02:ab:81:9f:01:46:72:ed:b4:8c:e9:70:07
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #732: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #733: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #734: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
Parameters:
Salt:
ad:48:b8:f8:c6:37:fb:02:d9:1d:aa:78:94:42:27:cb
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #735: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #736: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #737: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
Parameters:
Salt:
aa:04:29:0e:86:45:50:2e:84:88:39:45:54:d0:7f:9c
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #738: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #739: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #740: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
Parameters:
Salt:
bb:22:e5:47:e6:b6:ac:c6:c2:f1:5f:ee:f4:55:a5:50
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #741: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #742: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD2 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #743: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC
Parameters:
Salt:
57:32:cc:5c:90:b4:68:fc:7a:d9:aa:70:8c:f8:9b:97
Iteration Count: 2000 (0x7d0)
tools.sh: #744: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #745: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #746: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
Parameters:
Salt:
ac:0b:5b:68:e6:97:8c:0a:cb:76:ff:b5:9f:04:91:52
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #747: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #748: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #749: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
Parameters:
Salt:
35:ac:52:5b:d5:21:52:2d:19:19:a9:a9:7f:02:7c:be
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #750: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #751: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #752: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
Parameters:
Salt:
0c:2c:f4:5b:43:48:48:6b:2c:1a:a4:2c:c5:9b:c2:5c
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #753: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #754: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #755: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
Parameters:
Salt:
49:2f:8d:a6:48:a1:4e:c8:e8:81:4f:25:ab:1b:86:76
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #756: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #757: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with MD5 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #758: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC
Parameters:
Salt:
3a:5a:74:fa:15:c0:ea:eb:7f:8b:6d:9b:dd:3d:d1:ed
Iteration Count: 2000 (0x7d0)
tools.sh: #759: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #760: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #761: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
Parameters:
Salt:
eb:5b:8a:77:de:8f:ad:d9:42:c8:bd:67:7e:f0:4b:e5
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #762: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #763: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #764: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
Parameters:
Salt:
da:44:24:c6:44:b4:6d:78:94:6f:9b:e6:cf:cd:b7:6d
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #765: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #766: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #767: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
Parameters:
Salt:
f3:a7:6c:b5:a3:42:eb:af:77:f7:2e:19:ef:65:db:7e
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #768: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #769: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #770: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
Parameters:
Salt:
09:60:73:2c:1f:a6:b1:bb:99:5a:b9:77:5f:b6:7d:e2
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #771: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #772: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c PKCS #5 Password Based Encryption with SHA-1 and DES-CBC -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #773: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
Parameters:
Salt:
c9:98:90:4c:90:8d:3e:24:c1:a8:0d:6e:72:cb:56:b0
Iteration Count: 2000 (0x7d0)
tools.sh: #774: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #775: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD2 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #776: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
a9:6c:cc:d9:f8:56:9b:1e:56:57:ec:0b:0c:31:4c:c1
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #777: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #778: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with MD5 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #779: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
ea:ee:f8:2a:87:bd:e8:18:71:07:00:c2:44:3f:1d:57
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #780: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #781: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -C PKCS #5 Password Based Encryption with SHA-1 and DES-CBC
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #782: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
6b:fe:23:e2:cb:ad:b1:91:85:c1:dc:97:07:06:07:6c
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #783: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #784: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #785: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
77:15:09:85:85:50:73:ea:5c:eb:18:b2:60:cf:78:79
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #786: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #787: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting with [default:null]
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #788: Exporting with [default:null] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
58:c9:db:2e:86:7a:ea:e9:3a:30:91:6a:2c:c8:d7:67
Iteration Count: 2000 (0x7d0)
tools.sh: #789: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #790: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #791: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
63:8e:31:91:81:60:4b:98:f5:6e:3c:17:74:ab:19:b2
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #792: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #793: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #794: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
94:84:cf:38:4f:c2:f8:e7:46:09:74:f0:61:0e:82:e5
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #795: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #796: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #797: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
dc:db:47:ab:21:98:4b:56:29:38:72:7d:a5:14:40:11
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #798: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #799: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #800: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
8e:6e:7c:e9:48:cc:ef:f7:e9:e0:22:27:f1:86:64:fa
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #801: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #802: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #803: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
47:28:d9:f1:4e:26:0a:44:ba:de:3d:ad:3d:54:5f:d5
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #804: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #805: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #806: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
ba:06:84:17:bd:fb:a1:f3:ae:af:54:69:48:96:49:f1
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #807: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #808: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #809: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
41:2d:29:8a:3b:de:c1:46:2e:54:cd:52:44:15:aa:dc
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #810: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #811: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #812: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
93:c7:83:bf:5d:20:20:e7:c9:9d:ed:7b:2f:69:41:56
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #813: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #814: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #815: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
f9:9f:99:e6:77:27:f0:70:09:9c:2e:97:ce:a9:ad:54
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #816: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #817: Importing Alice.p12 (pk12util -i) - PASSED
tools.sh: Exporting Alice's key & cert with [default:default] (pk12util -o)
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #818: Exporting Alices's key & cert with [default:default] (pk12util -o) - PASSED
tools.sh: Listing Alice's pk12 file
pk12util -l Alice.p12 -w ../tests.pw
Key(shrouded):
Friendly Name: Alice
Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC
Parameters:
Salt:
ef:1f:79:d0:16:76:94:9f:e3:f0:ca:67:a9:c0:30:a7
Iteration Count: 2000 (0x7d0)
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:00:11 2017
Not After : Tue May 31 23:00:11 2067
Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=
US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
b6:12:c7:4e:5e:82:1c:d0:f0:27:76:03:2e:2b:7a:88:
76:0f:fe:b5:8f:f8:3a:d5:01:5a:57:81:fe:5b:40:3e:
19:b7:bd:ff:1c:f8:7a:c4:15:87:5e:21:31:74:fd:98:
06:e6:23:57:54:50:00:ba:d4:9b:1b:91:40:70:aa:59:
6b:cc:e8:10:16:d2:5e:b1:ab:09:d5:e9:a3:d9:4b:b0:
cd:f4:53:22:f9:09:10:bf:df:c7:7e:da:70:c4:76:b7:
32:66:4f:04:e3:94:6d:56:60:b1:69:60:a2:e9:42:b2:
b3:36:7f:8a:50:63:fb:89:68:c2:0f:d3:c1:74:8a:e8:
88:bd:fd:df:f0:7c:44:48:bf:93:f5:0e:3f:e0:41:7a:
36:03:8e:e2:03:58:dc:43:85:77:cf:c2:49:a4:5c:38:
a3:7f:c6:31:87:f4:36:0c:24:d0:3b:6f:65:80:2e:fa:
db:c8:ae:89:18:ec:eb:b9:9f:d2:4e:97:70:71:7e:e3:
a2:90:be:0c:16:0c:da:f7:33:35:df:9a:36:25:f8:7a:
a2:7d:34:2c:13:72:79:12:56:c9:67:8a:ff:8f:6c:90:
44:e0:78:59:bb:e1:91:9d:43:fd:ec:4f:58:48:2e:01:
c8:36:80:07:e3:f8:1b:ef:60:84:ef:e9:38:c7:8e:4f
Exponent: 65537 (0x10001)
Signed Extensions:
Name: Certificate Type
Data: <SSL CA,S/MIME CA,ObjectSigning CA>
Name: Certificate Basic Constraints
Data: Is a CA with no maximum path length.
Name: Certificate Key Usage
Usages: Certificate Signing
CRL Signing
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
93:c3:8e:f3:48:7b:e7:f1:05:05:d7:84:96:1d:6d:30:
b3:98:60:9c:9b:89:da:9e:cf:eb:d8:b9:30:e8:d8:a2:
82:0f:a3:0b:1f:8a:23:2c:a9:c4:0b:55:c5:f7:d7:58:
15:2d:ef:06:10:79:cc:61:67:1f:c3:ff:4c:69:8e:a4:
93:33:9e:7e:81:a3:0d:9c:4f:8f:76:f4:50:10:e8:a7:
33:dd:d9:d6:70:37:90:be:1a:3e:ac:3a:75:96:fe:d3:
5d:46:23:6c:1d:c4:c4:5c:4f:ba:d7:87:d4:a7:33:43:
95:48:6f:14:ba:54:f1:eb:ad:e6:a7:5a:66:22:21:3c:
7d:2a:fa:0c:52:d4:bf:55:41:03:ec:02:af:b8:72:32:
f6:f8:ff:db:6c:68:3a:5e:e0:f9:e2:cb:50:f9:e9:aa:
e6:57:10:48:39:ed:75:3b:60:70:b2:f1:11:07:3a:55:
d9:d9:da:0e:a0:cd:71:6c:fa:e1:e8:fd:3a:4a:e7:0d:
d7:a6:df:84:f3:ee:58:42:a2:bb:15:34:de:36:db:e9:
07:7e:5b:d9:d2:a6:33:a2:b7:62:e8:04:7a:5a:4f:a5:
5a:7a:21:28:7e:d0:fc:71:88:02:5e:3b:8d:aa:2c:fb:
1f:4a:50:e7:de:1d:d7:62:f3:17:57:b8:d9:ee:95:cc
Fingerprint (SHA-256):
E2:9A:DD:64:9D:3D:70:FB:B6:F9:51:72:3F:56:04:B5:72:BD:84:25:66:31:45:06:0F:57:05:BF:05:A5:BC:D9
Fingerprint (SHA1):
EE:B7:2E:A5:81:02:D5:B6:51:67:01:B7:2B:46:30:F5:7E:77:77:42
Friendly Name: TestCA
Certificate(has private key):
Data:
Version: 3 (0x2)
Serial Number: 30 (0x1e)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U
S"
Validity:
Not Before: Wed May 31 23:02:22 2017
Not After : Tue May 31 23:02:22 2022
Subject: "CN=Alice,E=Alice@bogus.com,O=BOGUS NSS,L=Mountain View,ST=C
alifornia,C=US"
Subject Public Key Info:
Public Key Algorithm: PKCS #1 RSA Encryption
RSA Public Key:
Modulus:
a2:89:5b:64:c1:9e:ce:65:8b:95:10:36:a4:8d:72:3d:
2f:69:1c:96:16:36:c3:f2:a6:f4:e7:e4:47:41:50:ca:
d7:f0:d3:07:31:c6:1d:a4:75:64:ff:96:78:da:ca:c4:
61:35:de:ff:0d:21:45:a3:94:31:88:11:98:d9:7e:5a:
15:18:13:c6:99:10:25:4e:54:73:a1:b4:f4:b4:5a:ed:
9b:57:54:81:a9:c4:91:30:22:53:c7:5b:9c:eb:cd:76:
41:f7:46:22:f3:69:6e:58:57:78:1f:47:d9:36:60:3c:
de:1e:49:78:b7:4a:b9:54:70:fc:5b:f7:c8:7a:19:d0:
35:e3:71:16:d8:45:5a:d6:ac:53:5c:f4:0d:62:44:5a:
57:2a:f5:86:37:60:d7:4f:99:eb:b6:dd:02:23:24:9a:
98:3d:7b:a8:79:42:31:ab:b9:dd:bf:41:1d:7e:5e:f8:
03:1c:32:07:8a:53:2b:35:6f:63:c6:ec:23:f1:75:18:
47:5d:84:4c:a4:cd:94:33:8f:0a:da:f6:bd:cb:6f:14:
00:00:da:49:20:20:9d:6e:74:a7:54:1f:ae:56:9d:ab:
30:1a:91:88:8d:a4:8d:c5:7b:42:fe:50:8e:56:e5:b5:
03:db:70:92:0b:3d:fa:3f:de:e7:48:3a:04:d0:0d:61
Exponent: 65537 (0x10001)
Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption
Signature:
73:7a:15:e3:61:79:8d:f2:d5:8c:ac:5e:46:ee:45:87:
a3:7b:7e:f6:e7:d0:e6:92:12:2f:fd:06:13:c1:8d:bb:
c8:a9:3f:e1:8b:47:71:3c:d8:f6:3e:32:0c:cd:9c:cc:
6f:4f:ac:fa:67:de:f6:b5:c6:74:08:1a:be:63:57:4e:
e7:56:df:f9:c8:f7:91:9a:78:ee:74:cd:00:33:d8:c1:
d1:60:49:e6:d2:f1:b1:b8:b3:ad:9a:a4:6e:6f:b1:c1:
da:f2:37:bb:81:29:e7:15:1e:37:32:8d:4a:70:f9:bc:
d9:09:f7:b0:47:6c:08:1b:0a:18:5b:b7:dc:0c:a8:2e:
8b:50:81:33:db:6e:c7:2b:bf:a7:9f:2e:4a:4d:c9:86:
9f:ea:92:16:bb:d7:ec:4c:85:03:a7:2c:c1:f5:e9:d4:
f2:7a:d1:d7:62:b5:1f:2e:f7:94:8d:60:e2:e9:c8:62:
05:b2:f1:92:69:bc:20:ef:ce:64:3a:2c:16:31:c1:f3:
d1:29:99:e3:07:35:f2:66:02:94:61:a8:e2:78:00:a9:
81:d0:68:09:6a:d6:54:12:6f:b8:0f:08:7a:0e:ba:b8:
0b:9c:0d:bc:6d:5c:c9:63:a0:ce:e1:e8:18:b9:4f:63:
3d:18:28:57:3e:95:7b:9f:f9:7b:8d:1a:94:83:76:56
Fingerprint (SHA-256):
B9:8D:03:99:6A:03:C6:E4:47:21:2A:FB:1B:50:39:98:B1:F9:73:EE:D4:C9:B2:17:9F:7E:97:80:2E:99:20:21
Fingerprint (SHA1):
A3:81:B9:6C:41:BF:64:CA:25:A8:FD:5F:F3:E9:B6:37:06:F1:37:00
Friendly Name: Alice
tools.sh: #819: Listing Alice.p12 (pk12util -l) - PASSED
tools.sh: Importing Alice's pk12 Alice.p12 file
pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw
pk12util: PKCS12 IMPORT SUCCESSFUL
tools.sh: #820: Importing Alice.p12 (pk12util -i) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -c null
pk12util: Algorithm: "null": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm.
tools.sh: #821: Exporting with [null:default] (pk12util -o) - PASSED
pk12util -o Alice.p12 -n "Alice" -d ../alicedir \
-k ../tests.pw -w ../tests.pw -C null
pk12util: PKCS12 EXPORT SUCCESSFUL
tools.sh: #822: Exporting with [default:null] (pk12util -o) - PASSED
tools.sh: Create objsign cert -------------------------------
signtool -G "objectsigner" -d ../tools/signdir -p "nss"
WARNING: Performing this operation while the browser is running could cause
corruption of your security databases. If the browser is currently running,
you should exit the browser before continuing this operation. Enter
"y" to continue, or anything else to abort:
Enter certificate information. All fields are optional. Acceptable
characters are numbers, letters, spaces, and apostrophes.
certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair
certificate request generated
certificate has been signed
certificate "objsigner" added to database
Exported certificate to x509.raw and x509.cacert.
tools.sh: #823: Create objsign cert (signtool -G) - PASSED
tools.sh: Signing a jar of files ----------------------------
signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \
../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> sign.html
adding ../tools/html/sign.html to nojs.jar...(deflated 26%)
--> signjs.html
adding ../tools/html/signjs.html to nojs.jar...(deflated 28%)
Generating zigbert.sf file..
adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%)
adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%)
tree "../tools/html" signed successfully
tools.sh: #824: Signing a jar of files (signtool -Z) - PASSED
tools.sh: Listing signed files in jar ----------------------
signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner
archive "nojs.jar" has passed crypto verification.
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
md5 digest on global metainfo: match
sha digest on global metainfo: match
found a RSA signature file: META-INF/zigbert.rsa
status path
------------ -------------------
verified sign.html
verified signjs.html
tools.sh: #825: Listing signed files in jar (signtool -v) - PASSED
tools.sh: Show who signed jar ------------------------------
signtool -w nojs.jar -d ../tools/signdir
Signer information:
nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #826: Show who signed jar (signtool -w) - PASSED
tools.sh: Signing a xpi of files ----------------------------
signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \
../tools/html
Generating ../tools/html/META-INF/manifest.mf file..
--> sign.html
--> signjs.html
Generating zigbert.sf file..
Creating XPI Compatible Archive
adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%)
--> sign.html
adding ../tools/html/sign.html to nojs.xpi...(deflated 26%)
--> signjs.html
adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%)
adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%)
adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%)
tree "../tools/html" signed successfully
tools.sh: #827: Signing a xpi of files (signtool -Z -X) - PASSED
tools.sh: Listing signed files in xpi ----------------------
signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner
archive "nojs.xpi" has passed crypto verification.
found a RSA signature file: META-INF/zigbert.rsa
found a MF master manifest file: META-INF/manifest.mf
found a SF signature manifest file: META-INF/zigbert.sf
md5 digest on global metainfo: match
sha digest on global metainfo: match
status path
------------ -------------------
verified sign.html
verified signjs.html
tools.sh: #828: Listing signed files in xpi (signtool -v) - PASSED
tools.sh: Show who signed xpi ------------------------------
signtool -w nojs.xpi -d ../tools/signdir
Signer information:
nickname: objsigner
subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org
tools.sh: #829: Show who signed xpi (signtool -w) - PASSED
TIMESTAMP tools END: Wed May 31 23:11:33 UTC 2017
Running tests for fips
TIMESTAMP fips BEGIN: Wed May 31 23:11:33 UTC 2017
fips.sh: FIPS 140 Compliance Tests ===============================
fips.sh: Verify this module is in FIPS mode -----------------
modutil -dbdir ../fips -list
Listing of PKCS #11 Modules
-----------------------------------------------------------
1. NSS Internal FIPS PKCS #11 Module
slots: 1 slot attached
status: loaded
slot: NSS FIPS 140-2 User Private Key Services
token: NSS FIPS 140-2 Certificate DB
2. RootCerts
library name: /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so
slots: 1 slot attached
status: loaded
slot: NSS Builtin Objects
token: Builtin Object Token
-----------------------------------------------------------
FIPS mode enabled.
fips.sh: #830: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L
Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI
FIPS_PUB_140_Test_Certificate Cu,Cu,Cu
fips.sh: #831: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys -------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa 08121855dca0d027f0e70c9adb6d5180a7d07e08 NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate
fips.sh: #832: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Attempt to list FIPS module keys with incorrect password
certutil -d ../fips -K -f /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/tests.fipsbadpw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
Incorrect password/PIN entered.
certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect.
fips.sh: #833: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED
certutil -K returned 255
fips.sh: Validate the certificate --------------------------
certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw
certutil: certificate is valid
fips.sh: #834: Validate the certificate (certutil -V -e) . - PASSED
fips.sh: Export the certificate and key as a PKCS#12 file --
pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 EXPORT SUCCESSFUL
fips.sh: #835: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED
fips.sh: Export the certificate as a DER-encoded file ------
certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt
fips.sh: #836: Export the certificate as a DER (certutil -L -r) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L
Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI
FIPS_PUB_140_Test_Certificate Cu,Cu,Cu
fips.sh: #837: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Delete the certificate and key from the FIPS module
certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw
fips.sh: #838: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L
Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI
fips.sh: #839: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys.
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
certutil: no keys found
fips.sh: #840: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #841: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L
Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI
FIPS_PUB_140_Test_Certificate u,u,u
fips.sh: #842: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa 08121855dca0d027f0e70c9adb6d5180a7d07e08 FIPS_PUB_140_Test_Certificate
fips.sh: #843: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Delete the certificate from the FIPS module
certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate
fips.sh: #844: Delete the certificate from the FIPS module (certutil -D) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L
Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI
fips.sh: #845: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: Import the certificate and key from the PKCS#12 file
pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw
pk12util: PKCS12 IMPORT SUCCESSFUL
fips.sh: #846: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED
fips.sh: List the FIPS module certificates -----------------
certutil -d ../fips -L
Certificate Nickname Trust Attributes
SSL,S/MIME,JAR/XPI
FIPS_PUB_140_Test_Certificate u,u,u
fips.sh: #847: List the FIPS module certificates (certutil -L) . - PASSED
fips.sh: List the FIPS module keys --------------------------
certutil -d ../fips -K -f ../tests.fipspw
certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services"
< 0> dsa 08121855dca0d027f0e70c9adb6d5180a7d07e08 FIPS_PUB_140_Test_Certificate
fips.sh: #848: List the FIPS module keys (certutil -K) . - PASSED
fips.sh: Run PK11MODE in FIPSMODE -----------------
pk11mode -d ../fips -p fips- -f ../tests.fipspw
Loaded FC_GetFunctionList for FIPS MODE; slotID 0
Loaded FC_GetFunctionList for FIPS MODE; slotID 0
Loaded FC_GetFunctionList for FIPS MODE; slotID 0
Loaded FC_GetFunctionList for FIPS MODE; slotID 0
Loaded FC_GetFunctionList for FIPS MODE; slotID 0
Loaded FC_GetFunctionList for FIPS MODE; slotID 0
Loaded FC_GetFunctionList for FIPS MODE; slotID 0
**** Total number of TESTS ran in FIPS MODE is 106. ****
**** ALL TESTS PASSED ****
fips.sh: #849: Run PK11MODE in FIPS mode (pk11mode) . - PASSED
fips.sh: Run PK11MODE in Non FIPSMODE -----------------
pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n
loaded C_GetFunctionList for NON FIPS MODE; slotID 1
loaded C_GetFunctionList for NON FIPS MODE; slotID 1
loaded C_GetFunctionList for NON FIPS MODE; slotID 1
loaded C_GetFunctionList for NON FIPS MODE; slotID 1
loaded C_GetFunctionList for NON FIPS MODE; slotID 1
loaded C_GetFunctionList for NON FIPS MODE; slotID 1
loaded C_GetFunctionList for NON FIPS MODE; slotID 1
**** Total number of TESTS ran in NON FIPS MODE is 104. ****
**** ALL TESTS PASSED ****
fips.sh: #850: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED
mkdir /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libcertdb.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libcerthi.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libcrmf.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libcryptohi.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libdbm.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libfreebl.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libfreebl3.chk /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libfreebl3.so /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libfreeblpriv3.chk /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libfreeblpriv3.so /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libgtest.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libgtest1.so /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libjar.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnss.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnss3.so /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnssb.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnssckbi.so /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnssckfw.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnssdbm.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnssdbm3.chk /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnssdbm3.so /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnssdev.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnsspki.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnssutil.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libnssutil3.so /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpk11wrap.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkcs12.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkcs7.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixcertsel.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixchecker.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixcrlsel.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixmodule.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixparams.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixpki.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixresults.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixstore.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixsystem.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixtop.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libpkixutil.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libsectool.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libsmime.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libsmime3.so /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libsoftokn.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libsoftokn3.chk /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libsoftokn3.so /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libssl.a /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
cp /<<PKGBUILDDIR>>/dist/lib/libssl3.so /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle
fips.sh: Detect mangled softoken--------------------------
mangling /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle/libsoftokn3.so
mangle -i /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle/libsoftokn3.so -o -8 -b 5
Changing byte 0x000f5577 (1004919): from 5f (95) to 7f (127)
LD_LIBRARY_PATH=/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/fips/mangle dbtest -r -d ../fips
fips.sh: #851: Init NSS with a corrupted library (dbtest -r) . - PASSED
fips.sh done
TIMESTAMP fips END: Wed May 31 23:12:42 UTC 2017
Running tests for sdr
TIMESTAMP sdr BEGIN: Wed May 31 23:12:42 UTC 2017
sdr.sh: SDR Tests ===============================
sdr.sh: Creating an SDR key/SDR Encrypt - Value 1
sdrtest -d . -o /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/tests.v1.23539 -t "Test1"
sdr.sh: #852: Creating SDR Key/Encrypt - Value 1 - PASSED
sdr.sh: SDR Encrypt - Value 2
sdrtest -d . -o /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/tests.v2.23539 -t "The quick brown fox jumped over the lazy dog"
sdr.sh: #853: Encrypt - Value 2 - PASSED
sdr.sh: SDR Encrypt - Value 3
sdrtest -d . -o /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/tests.v3.23539 -t "1234567"
sdr.sh: #854: Encrypt - Value 3 - PASSED
sdr.sh: SDR Decrypt - Value 1
sdrtest -d . -i /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/tests.v1.23539 -t "Test1"
sdr.sh: #855: Decrypt - Value 1 - PASSED
sdr.sh: SDR Decrypt - Value 2
sdrtest -d . -i /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/tests.v2.23539 -t "The quick brown fox jumped over the lazy dog"
sdr.sh: #856: Decrypt - Value 2 - PASSED
sdr.sh: SDR Decrypt - Value 3
sdrtest -d . -i /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/tests.v3.23539 -t "1234567"
sdr.sh: #857: Decrypt - Value 3 - PASSED
TIMESTAMP sdr END: Wed May 31 23:12:43 UTC 2017
Running tests for crmf
TIMESTAMP crmf BEGIN: Wed May 31 23:12:43 UTC 2017
crmf.sh: CRMF/CMMF Tests ===============================
crmf.sh: CRMF/CMMF Tests ------------------------------
crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss crmf decode
crmftest v1.0
Generating CRMF request
Decoding CRMF request
crmftest: Processing cert request 0
crmftest: Processing cert request 1
Exiting successfully!!!
crmf.sh: #858: CRMF test . - PASSED
crmftest -d ../bobdir -p Bob -e dave@bogus.com -s TestCA -P nss cmmf
crmftest v1.0
Doing CMMF Stuff
Exiting successfully!!!
crmf.sh: #859: CMMF test . - PASSED
TIMESTAMP crmf END: Wed May 31 23:12:44 UTC 2017
Running tests for smime
TIMESTAMP smime BEGIN: Wed May 31 23:12:44 UTC 2017
smime.sh: S/MIME Tests with ECC ===============================
smime.sh: Signing Detached Message {SHA1} ------------------
cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1
smime.sh: #860: Create Detached Signature Alice (SHA1) . - PASSED
cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com
This is a test message from Alice to Bob.
smime.sh: #861: Verifying Alice's Detached Signature (SHA1) . - PASSED
smime.sh: Signing Attached Message (SHA1) ------------------
cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1
smime.sh: #862: Create Attached Signature Alice (SHA1) . - PASSED
cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.SHA1
smime.sh: #863: Decode Alice's Attached Signature (SHA1) . - PASSED
diff alice.txt alice.data.SHA1
smime.sh: #864: Compare Attached Signed Data and Original (SHA1) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA1} ------------------
cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1
smime.sh: #865: Create Detached Signature Alice (ECDSA w/ SHA1) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com
This is a test message from Alice to Bob.
smime.sh: #866: Verifying Alice's Detached Signature (ECDSA w/ SHA1) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA1) ------------------
cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1
smime.sh: #867: Create Attached Signature Alice (ECDSA w/ SHA1) . - PASSED
cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.SHA1
smime.sh: #868: Decode Alice's Attached Signature (ECDSA w/ SHA1) . - PASSED
diff alice.txt alice-ec.data.SHA1
smime.sh: #869: Compare Attached Signed Data and Original (ECDSA w/ SHA1) . - PASSED
smime.sh: Signing Detached Message {SHA256} ------------------
cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256
smime.sh: #870: Create Detached Signature Alice (SHA256) . - PASSED
cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com
This is a test message from Alice to Bob.
smime.sh: #871: Verifying Alice's Detached Signature (SHA256) . - PASSED
smime.sh: Signing Attached Message (SHA256) ------------------
cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256
smime.sh: #872: Create Attached Signature Alice (SHA256) . - PASSED
cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.SHA256
smime.sh: #873: Decode Alice's Attached Signature (SHA256) . - PASSED
diff alice.txt alice.data.SHA256
smime.sh: #874: Compare Attached Signed Data and Original (SHA256) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA256} ------------------
cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256
smime.sh: #875: Create Detached Signature Alice (ECDSA w/ SHA256) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com
This is a test message from Alice to Bob.
smime.sh: #876: Verifying Alice's Detached Signature (ECDSA w/ SHA256) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA256) ------------------
cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256
smime.sh: #877: Create Attached Signature Alice (ECDSA w/ SHA256) . - PASSED
cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.SHA256
smime.sh: #878: Decode Alice's Attached Signature (ECDSA w/ SHA256) . - PASSED
diff alice.txt alice-ec.data.SHA256
smime.sh: #879: Compare Attached Signed Data and Original (ECDSA w/ SHA256) . - PASSED
smime.sh: Signing Detached Message {SHA384} ------------------
cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384
smime.sh: #880: Create Detached Signature Alice (SHA384) . - PASSED
cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com
This is a test message from Alice to Bob.
smime.sh: #881: Verifying Alice's Detached Signature (SHA384) . - PASSED
smime.sh: Signing Attached Message (SHA384) ------------------
cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384
smime.sh: #882: Create Attached Signature Alice (SHA384) . - PASSED
cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.SHA384
smime.sh: #883: Decode Alice's Attached Signature (SHA384) . - PASSED
diff alice.txt alice.data.SHA384
smime.sh: #884: Compare Attached Signed Data and Original (SHA384) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA384} ------------------
cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384
smime.sh: #885: Create Detached Signature Alice (ECDSA w/ SHA384) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com
This is a test message from Alice to Bob.
smime.sh: #886: Verifying Alice's Detached Signature (ECDSA w/ SHA384) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA384) ------------------
cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384
smime.sh: #887: Create Attached Signature Alice (ECDSA w/ SHA384) . - PASSED
cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.SHA384
smime.sh: #888: Decode Alice's Attached Signature (ECDSA w/ SHA384) . - PASSED
diff alice.txt alice-ec.data.SHA384
smime.sh: #889: Compare Attached Signed Data and Original (ECDSA w/ SHA384) . - PASSED
smime.sh: Signing Detached Message {SHA512} ------------------
cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512
smime.sh: #890: Create Detached Signature Alice (SHA512) . - PASSED
cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com
This is a test message from Alice to Bob.
smime.sh: #891: Verifying Alice's Detached Signature (SHA512) . - PASSED
smime.sh: Signing Attached Message (SHA512) ------------------
cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512
smime.sh: #892: Create Attached Signature Alice (SHA512) . - PASSED
cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.SHA512
smime.sh: #893: Decode Alice's Attached Signature (SHA512) . - PASSED
diff alice.txt alice.data.SHA512
smime.sh: #894: Compare Attached Signed Data and Original (SHA512) . - PASSED
smime.sh: Signing Detached Message ECDSA w/ {SHA512} ------------------
cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512
smime.sh: #895: Create Detached Signature Alice (ECDSA w/ SHA512) . - PASSED
cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir
Date: Wed, 20 Sep 2000 00:00:01 -0700 (PDT)
From: alice@bogus.com
Subject: message Alice --> Bob
To: bob@bogus.com
This is a test message from Alice to Bob.
smime.sh: #896: Verifying Alice's Detached Signature (ECDSA w/ SHA512) . - PASSED
smime.sh: Signing Attached Message (ECDSA w/ SHA512) ------------------
cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512
smime.sh: #897: Create Attached Signature Alice (ECDSA w/ SHA512) . - PASSED
cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.SHA512
smime.sh: #898: Decode Alice's Attached Signature (ECDSA w/ SHA512) . - PASSED
diff alice.txt alice-ec.data.SHA512
smime.sh: #899: Compare Attached Signed Data and Original (ECDSA w/ SHA512) . - PASSED
smime.sh: Enveloped Data Tests ------------------------------
cmsutil -E -r bob@bogus.com -i alice.txt -d ../alicedir -p nss \
-o alice.env
smime.sh: #900: Create Enveloped Data Alice . - PASSED
cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1
smime.sh: #901: Decode Enveloped Data Alice . - PASSED
diff alice.txt alice.data1
smime.sh: #902: Compare Decoded Enveloped Data and Original . - PASSED
smime.sh: Testing multiple recipients ------------------------------
cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \
-r bob@bogus.com,dave@bogus.com
smime.sh: #903: Create Multiple Recipients Enveloped Data Alice . - PASSED
smime.sh: Testing multiple email addrs ------------------------------
cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \
-r eve@bogus.net
smime.sh: #904: Encrypt to a Multiple Email cert . - PASSED
cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2
smime.sh: #905: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED
cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3
smime.sh: #906: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED
cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4
smime.sh: #907: Decrypt with a Multiple Email cert . - PASSED
smime.sh: #908: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED
smime.sh: #909: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED
smime.sh: #910: Compare Decoded with Multiple Email cert . - PASSED
smime.sh: Sending CERTS-ONLY Message ------------------------------
cmsutil -O -r "Alice,bob@bogus.com,dave@bogus.com" \
-d ../alicedir > co.der
smime.sh: #911: Create Certs-Only Alice . - PASSED
cmsutil -D -i co.der -d ../bobdir
smime.sh: #912: Verify Certs-Only by CA . - PASSED
smime.sh: Encrypted-Data Message ---------------------------------
cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \
-r "bob@bogus.com" > alice.enc
smime.sh: #913: Create Encrypted-Data . - PASSED
cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \
-o alice.data2
smime.sh: #914: Decode Encrypted-Data . - PASSED
smime.sh: #915: Compare Decoded and Original Data . - PASSED
smime.sh: p7 util Data Tests ------------------------------
p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env
smime.sh: #916: Creating envelope for user Alice . - PASSED
p7content -d ../alicedir -i alice.env -o alice_p7.data
smime.sh: #917: Verifying file delivered to user Alice . - PASSED
diff alice.txt alice_p7.data.sed
smime.sh: #918: Compare Decoded Enveloped Data and Original . - PASSED
p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e
smime.sh: #919: Signing file for user Alice . - PASSED
p7verify -d ../alicedir -c alice.txt -s alice.sig
Signature is valid.
smime.sh: #920: Verifying file delivered to user Alice . - PASSED
TIMESTAMP smime END: Wed May 31 23:12:55 UTC 2017
Running tests for ssl
TIMESTAMP ssl BEGIN: Wed May 31 23:12:55 UTC 2017
ssl.sh: SSL tests ===============================
ssl.sh: CRL SSL Client Tests - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed May 31 23:12:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:12:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13592 >/dev/null 2>/dev/null
selfserv with PID 13592 found at Wed May 31 23:12:55 UTC 2017
selfserv with PID 13592 started at Wed May 31 23:12:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #921: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13592 at Wed May 31 23:12:56 UTC 2017
kill -USR1 13592
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13592 killed at Wed May 31 23:12:56 UTC 2017
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed May 31 23:12:56 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:12:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13648 >/dev/null 2>/dev/null
selfserv with PID 13648 found at Wed May 31 23:12:57 UTC 2017
selfserv with PID 13648 started at Wed May 31 23:12:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #922: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13648 at Wed May 31 23:12:58 UTC 2017
kill -USR1 13648
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13648 killed at Wed May 31 23:12:58 UTC 2017
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed May 31 23:12:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:12:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13704 >/dev/null 2>/dev/null
selfserv with PID 13704 found at Wed May 31 23:12:58 UTC 2017
selfserv with PID 13704 started at Wed May 31 23:12:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #923: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13704 at Wed May 31 23:12:59 UTC 2017
kill -USR1 13704
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13704 killed at Wed May 31 23:12:59 UTC 2017
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Wed May 31 23:12:59 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:12:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13772 >/dev/null 2>/dev/null
selfserv with PID 13772 found at Wed May 31 23:12:59 UTC 2017
selfserv with PID 13772 started at Wed May 31 23:12:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser40 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #924: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13772 at Wed May 31 23:13:00 UTC 2017
kill -USR1 13772
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13772 killed at Wed May 31 23:13:00 UTC 2017
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Wed May 31 23:13:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13828 >/dev/null 2>/dev/null
selfserv with PID 13828 found at Wed May 31 23:13:00 UTC 2017
selfserv with PID 13828 started at Wed May 31 23:13:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser41 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #925: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13828 at Wed May 31 23:13:01 UTC 2017
kill -USR1 13828
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13828 killed at Wed May 31 23:13:01 UTC 2017
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Wed May 31 23:13:01 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13888 >/dev/null 2>/dev/null
selfserv with PID 13888 found at Wed May 31 23:13:01 UTC 2017
selfserv with PID 13888 started at Wed May 31 23:13:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser42 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #926: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13888 at Wed May 31 23:13:03 UTC 2017
kill -USR1 13888
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13888 killed at Wed May 31 23:13:03 UTC 2017
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Wed May 31 23:13:03 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14029 >/dev/null 2>/dev/null
selfserv with PID 14029 found at Wed May 31 23:13:03 UTC 2017
selfserv with PID 14029 started at Wed May 31 23:13:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser40 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #927: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 14029 at Wed May 31 23:13:04 UTC 2017
kill -USR1 14029
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14029 killed at Wed May 31 23:13:04 UTC 2017
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Wed May 31 23:13:04 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14189 >/dev/null 2>/dev/null
selfserv with PID 14189 found at Wed May 31 23:13:04 UTC 2017
selfserv with PID 14189 started at Wed May 31 23:13:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #928: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14189 at Wed May 31 23:13:05 UTC 2017
kill -USR1 14189
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14189 killed at Wed May 31 23:13:05 UTC 2017
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Wed May 31 23:13:06 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14281 >/dev/null 2>/dev/null
selfserv with PID 14281 found at Wed May 31 23:13:06 UTC 2017
selfserv with PID 14281 started at Wed May 31 23:13:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser42 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #929: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 14281 at Wed May 31 23:13:07 UTC 2017
kill -USR1 14281
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14281 killed at Wed May 31 23:13:07 UTC 2017
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Wed May 31 23:13:07 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14436 >/dev/null 2>/dev/null
selfserv with PID 14436 found at Wed May 31 23:13:07 UTC 2017
selfserv with PID 14436 started at Wed May 31 23:13:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #930: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 14436 at Wed May 31 23:13:08 UTC 2017
kill -USR1 14436
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14436 killed at Wed May 31 23:13:08 UTC 2017
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Wed May 31 23:13:08 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14495 >/dev/null 2>/dev/null
selfserv with PID 14495 found at Wed May 31 23:13:08 UTC 2017
selfserv with PID 14495 started at Wed May 31 23:13:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #931: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 14495 at Wed May 31 23:13:09 UTC 2017
kill -USR1 14495
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14495 killed at Wed May 31 23:13:09 UTC 2017
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Wed May 31 23:13:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14551 >/dev/null 2>/dev/null
selfserv with PID 14551 found at Wed May 31 23:13:09 UTC 2017
selfserv with PID 14551 started at Wed May 31 23:13:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #932: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 14551 at Wed May 31 23:13:10 UTC 2017
kill -USR1 14551
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14551 killed at Wed May 31 23:13:10 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Wed May 31 23:13:11 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14619 >/dev/null 2>/dev/null
selfserv with PID 14619 found at Wed May 31 23:13:11 UTC 2017
selfserv with PID 14619 started at Wed May 31 23:13:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser40 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #933: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 14619 at Wed May 31 23:13:11 UTC 2017
kill -USR1 14619
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14619 killed at Wed May 31 23:13:11 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Wed May 31 23:13:12 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14675 >/dev/null 2>/dev/null
selfserv with PID 14675 found at Wed May 31 23:13:12 UTC 2017
selfserv with PID 14675 started at Wed May 31 23:13:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser41 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #934: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 14675 at Wed May 31 23:13:13 UTC 2017
kill -USR1 14675
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14675 killed at Wed May 31 23:13:13 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Wed May 31 23:13:13 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14731 >/dev/null 2>/dev/null
selfserv with PID 14731 found at Wed May 31 23:13:13 UTC 2017
selfserv with PID 14731 started at Wed May 31 23:13:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser42 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #935: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 14731 at Wed May 31 23:13:14 UTC 2017
kill -USR1 14731
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14731 killed at Wed May 31 23:13:14 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed May 31 23:13:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14799 >/dev/null 2>/dev/null
selfserv with PID 14799 found at Wed May 31 23:13:14 UTC 2017
selfserv with PID 14799 started at Wed May 31 23:13:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser40 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #936: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 14799 at Wed May 31 23:13:15 UTC 2017
kill -USR1 14799
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14799 killed at Wed May 31 23:13:15 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed May 31 23:13:15 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14855 >/dev/null 2>/dev/null
selfserv with PID 14855 found at Wed May 31 23:13:15 UTC 2017
selfserv with PID 14855 started at Wed May 31 23:13:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #937: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14855 at Wed May 31 23:13:16 UTC 2017
kill -USR1 14855
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14855 killed at Wed May 31 23:13:16 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed May 31 23:13:16 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14911 >/dev/null 2>/dev/null
selfserv with PID 14911 found at Wed May 31 23:13:16 UTC 2017
selfserv with PID 14911 started at Wed May 31 23:13:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser42 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #938: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 14911 at Wed May 31 23:13:17 UTC 2017
kill -USR1 14911
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14911 killed at Wed May 31 23:13:17 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed May 31 23:13:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14979 >/dev/null 2>/dev/null
selfserv with PID 14979 found at Wed May 31 23:13:18 UTC 2017
selfserv with PID 14979 started at Wed May 31 23:13:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #939: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 14979 at Wed May 31 23:13:18 UTC 2017
kill -USR1 14979
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14979 killed at Wed May 31 23:13:18 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed May 31 23:13:19 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15035 >/dev/null 2>/dev/null
selfserv with PID 15035 found at Wed May 31 23:13:19 UTC 2017
selfserv with PID 15035 started at Wed May 31 23:13:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #940: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15035 at Wed May 31 23:13:19 UTC 2017
kill -USR1 15035
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15035 killed at Wed May 31 23:13:20 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed May 31 23:13:20 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15091 >/dev/null 2>/dev/null
selfserv with PID 15091 found at Wed May 31 23:13:20 UTC 2017
selfserv with PID 15091 started at Wed May 31 23:13:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #941: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15091 at Wed May 31 23:13:21 UTC 2017
kill -USR1 15091
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15091 killed at Wed May 31 23:13:21 UTC 2017
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Wed May 31 23:13:21 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15159 >/dev/null 2>/dev/null
selfserv with PID 15159 found at Wed May 31 23:13:21 UTC 2017
selfserv with PID 15159 started at Wed May 31 23:13:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #942: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15159 at Wed May 31 23:13:22 UTC 2017
kill -USR1 15159
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15159 killed at Wed May 31 23:13:22 UTC 2017
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Wed May 31 23:13:22 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15215 >/dev/null 2>/dev/null
selfserv with PID 15215 found at Wed May 31 23:13:22 UTC 2017
selfserv with PID 15215 started at Wed May 31 23:13:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #943: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15215 at Wed May 31 23:13:23 UTC 2017
kill -USR1 15215
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15215 killed at Wed May 31 23:13:23 UTC 2017
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Wed May 31 23:13:23 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15271 >/dev/null 2>/dev/null
selfserv with PID 15271 found at Wed May 31 23:13:23 UTC 2017
selfserv with PID 15271 started at Wed May 31 23:13:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #944: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15271 at Wed May 31 23:13:24 UTC 2017
kill -USR1 15271
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15271 killed at Wed May 31 23:13:24 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Wed May 31 23:13:24 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15339 >/dev/null 2>/dev/null
selfserv with PID 15339 found at Wed May 31 23:13:24 UTC 2017
selfserv with PID 15339 started at Wed May 31 23:13:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #945: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 15339 at Wed May 31 23:13:25 UTC 2017
kill -USR1 15339
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15339 killed at Wed May 31 23:13:25 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Wed May 31 23:13:25 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15395 >/dev/null 2>/dev/null
selfserv with PID 15395 found at Wed May 31 23:13:25 UTC 2017
selfserv with PID 15395 started at Wed May 31 23:13:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #946: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15395 at Wed May 31 23:13:27 UTC 2017
kill -USR1 15395
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15395 killed at Wed May 31 23:13:27 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Wed May 31 23:13:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15451 >/dev/null 2>/dev/null
selfserv with PID 15451 found at Wed May 31 23:13:27 UTC 2017
selfserv with PID 15451 started at Wed May 31 23:13:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #947: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 15451 at Wed May 31 23:13:28 UTC 2017
kill -USR1 15451
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15451 killed at Wed May 31 23:13:28 UTC 2017
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Wed May 31 23:13:28 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15519 >/dev/null 2>/dev/null
selfserv with PID 15519 found at Wed May 31 23:13:28 UTC 2017
selfserv with PID 15519 started at Wed May 31 23:13:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #948: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 15519 at Wed May 31 23:13:29 UTC 2017
kill -USR1 15519
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15519 killed at Wed May 31 23:13:29 UTC 2017
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Wed May 31 23:13:29 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15575 >/dev/null 2>/dev/null
selfserv with PID 15575 found at Wed May 31 23:13:29 UTC 2017
selfserv with PID 15575 started at Wed May 31 23:13:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #949: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 15575 at Wed May 31 23:13:30 UTC 2017
kill -USR1 15575
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15575 killed at Wed May 31 23:13:30 UTC 2017
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Wed May 31 23:13:30 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15631 >/dev/null 2>/dev/null
selfserv with PID 15631 found at Wed May 31 23:13:30 UTC 2017
selfserv with PID 15631 started at Wed May 31 23:13:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #950: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 15631 at Wed May 31 23:13:31 UTC 2017
kill -USR1 15631
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15631 killed at Wed May 31 23:13:31 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Wed May 31 23:13:31 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15699 >/dev/null 2>/dev/null
selfserv with PID 15699 found at Wed May 31 23:13:31 UTC 2017
selfserv with PID 15699 started at Wed May 31 23:13:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #951: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 15699 at Wed May 31 23:13:32 UTC 2017
kill -USR1 15699
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15699 killed at Wed May 31 23:13:32 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Wed May 31 23:13:33 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15755 >/dev/null 2>/dev/null
selfserv with PID 15755 found at Wed May 31 23:13:33 UTC 2017
selfserv with PID 15755 started at Wed May 31 23:13:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #952: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 15755 at Wed May 31 23:13:34 UTC 2017
kill -USR1 15755
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15755 killed at Wed May 31 23:13:34 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Wed May 31 23:13:34 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15811 >/dev/null 2>/dev/null
selfserv with PID 15811 found at Wed May 31 23:13:34 UTC 2017
selfserv with PID 15811 started at Wed May 31 23:13:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #953: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 15811 at Wed May 31 23:13:35 UTC 2017
kill -USR1 15811
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15811 killed at Wed May 31 23:13:35 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed May 31 23:13:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15879 >/dev/null 2>/dev/null
selfserv with PID 15879 found at Wed May 31 23:13:35 UTC 2017
selfserv with PID 15879 started at Wed May 31 23:13:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #954: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 15879 at Wed May 31 23:13:36 UTC 2017
kill -USR1 15879
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15879 killed at Wed May 31 23:13:36 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed May 31 23:13:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15935 >/dev/null 2>/dev/null
selfserv with PID 15935 found at Wed May 31 23:13:36 UTC 2017
selfserv with PID 15935 started at Wed May 31 23:13:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #955: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 15935 at Wed May 31 23:13:37 UTC 2017
kill -USR1 15935
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15935 killed at Wed May 31 23:13:37 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed May 31 23:13:37 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15991 >/dev/null 2>/dev/null
selfserv with PID 15991 found at Wed May 31 23:13:37 UTC 2017
selfserv with PID 15991 started at Wed May 31 23:13:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #956: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 15991 at Wed May 31 23:13:38 UTC 2017
kill -USR1 15991
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15991 killed at Wed May 31 23:13:38 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:13:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16059 >/dev/null 2>/dev/null
selfserv with PID 16059 found at Wed May 31 23:13:39 UTC 2017
selfserv with PID 16059 started at Wed May 31 23:13:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #957: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16059 at Wed May 31 23:13:40 UTC 2017
kill -USR1 16059
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16059 killed at Wed May 31 23:13:40 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:13:40 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16115 >/dev/null 2>/dev/null
selfserv with PID 16115 found at Wed May 31 23:13:40 UTC 2017
selfserv with PID 16115 started at Wed May 31 23:13:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #958: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16115 at Wed May 31 23:13:41 UTC 2017
kill -USR1 16115
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16115 killed at Wed May 31 23:13:41 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:13:41 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16171 >/dev/null 2>/dev/null
selfserv with PID 16171 found at Wed May 31 23:13:41 UTC 2017
selfserv with PID 16171 started at Wed May 31 23:13:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #959: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16171 at Wed May 31 23:13:43 UTC 2017
kill -USR1 16171
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16171 killed at Wed May 31 23:13:43 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:13:43 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16239 >/dev/null 2>/dev/null
selfserv with PID 16239 found at Wed May 31 23:13:43 UTC 2017
selfserv with PID 16239 started at Wed May 31 23:13:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser40 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #960: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16239 at Wed May 31 23:13:44 UTC 2017
kill -USR1 16239
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16239 killed at Wed May 31 23:13:44 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:13:44 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16295 >/dev/null 2>/dev/null
selfserv with PID 16295 found at Wed May 31 23:13:44 UTC 2017
selfserv with PID 16295 started at Wed May 31 23:13:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser41 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #961: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16295 at Wed May 31 23:13:45 UTC 2017
kill -USR1 16295
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16295 killed at Wed May 31 23:13:45 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:13:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16351 >/dev/null 2>/dev/null
selfserv with PID 16351 found at Wed May 31 23:13:46 UTC 2017
selfserv with PID 16351 started at Wed May 31 23:13:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser42 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #962: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16351 at Wed May 31 23:13:47 UTC 2017
kill -USR1 16351
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16351 killed at Wed May 31 23:13:47 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:13:47 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16419 >/dev/null 2>/dev/null
selfserv with PID 16419 found at Wed May 31 23:13:47 UTC 2017
selfserv with PID 16419 started at Wed May 31 23:13:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser40 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #963: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16419 at Wed May 31 23:13:48 UTC 2017
kill -USR1 16419
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16419 killed at Wed May 31 23:13:48 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:13:48 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16475 >/dev/null 2>/dev/null
selfserv with PID 16475 found at Wed May 31 23:13:48 UTC 2017
selfserv with PID 16475 started at Wed May 31 23:13:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #964: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 16475 at Wed May 31 23:13:50 UTC 2017
kill -USR1 16475
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16475 killed at Wed May 31 23:13:50 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:13:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16531 >/dev/null 2>/dev/null
selfserv with PID 16531 found at Wed May 31 23:13:50 UTC 2017
selfserv with PID 16531 started at Wed May 31 23:13:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser42 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #965: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16531 at Wed May 31 23:13:51 UTC 2017
kill -USR1 16531
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16531 killed at Wed May 31 23:13:51 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:13:51 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16599 >/dev/null 2>/dev/null
selfserv with PID 16599 found at Wed May 31 23:13:51 UTC 2017
selfserv with PID 16599 started at Wed May 31 23:13:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #966: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16599 at Wed May 31 23:13:53 UTC 2017
kill -USR1 16599
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16599 killed at Wed May 31 23:13:53 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:13:53 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16655 >/dev/null 2>/dev/null
selfserv with PID 16655 found at Wed May 31 23:13:53 UTC 2017
selfserv with PID 16655 started at Wed May 31 23:13:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #967: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16655 at Wed May 31 23:13:54 UTC 2017
kill -USR1 16655
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16655 killed at Wed May 31 23:13:54 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:13:54 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16711 >/dev/null 2>/dev/null
selfserv with PID 16711 found at Wed May 31 23:13:54 UTC 2017
selfserv with PID 16711 started at Wed May 31 23:13:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #968: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16711 at Wed May 31 23:13:55 UTC 2017
kill -USR1 16711
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16711 killed at Wed May 31 23:13:55 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:13:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16779 >/dev/null 2>/dev/null
selfserv with PID 16779 found at Wed May 31 23:13:55 UTC 2017
selfserv with PID 16779 started at Wed May 31 23:13:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser40 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #969: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16779 at Wed May 31 23:13:57 UTC 2017
kill -USR1 16779
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16779 killed at Wed May 31 23:13:57 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:13:57 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16835 >/dev/null 2>/dev/null
selfserv with PID 16835 found at Wed May 31 23:13:57 UTC 2017
selfserv with PID 16835 started at Wed May 31 23:13:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser41 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #970: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16835 at Wed May 31 23:13:58 UTC 2017
kill -USR1 16835
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16835 killed at Wed May 31 23:13:58 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:13:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16891 >/dev/null 2>/dev/null
selfserv with PID 16891 found at Wed May 31 23:13:58 UTC 2017
selfserv with PID 16891 started at Wed May 31 23:13:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser42 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #971: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16891 at Wed May 31 23:13:59 UTC 2017
kill -USR1 16891
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16891 killed at Wed May 31 23:13:59 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:13:59 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:13:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16959 >/dev/null 2>/dev/null
selfserv with PID 16959 found at Wed May 31 23:14:00 UTC 2017
selfserv with PID 16959 started at Wed May 31 23:14:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser40 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #972: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 16959 at Wed May 31 23:14:01 UTC 2017
kill -USR1 16959
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16959 killed at Wed May 31 23:14:01 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:14:01 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17015 >/dev/null 2>/dev/null
selfserv with PID 17015 found at Wed May 31 23:14:01 UTC 2017
selfserv with PID 17015 started at Wed May 31 23:14:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #973: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17015 at Wed May 31 23:14:02 UTC 2017
kill -USR1 17015
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17015 killed at Wed May 31 23:14:02 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:14:02 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17071 >/dev/null 2>/dev/null
selfserv with PID 17071 found at Wed May 31 23:14:02 UTC 2017
selfserv with PID 17071 started at Wed May 31 23:14:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser42 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #974: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17071 at Wed May 31 23:14:04 UTC 2017
kill -USR1 17071
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17071 killed at Wed May 31 23:14:04 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:14:04 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17139 >/dev/null 2>/dev/null
selfserv with PID 17139 found at Wed May 31 23:14:04 UTC 2017
selfserv with PID 17139 started at Wed May 31 23:14:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #975: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17139 at Wed May 31 23:14:05 UTC 2017
kill -USR1 17139
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17139 killed at Wed May 31 23:14:05 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:14:06 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17195 >/dev/null 2>/dev/null
selfserv with PID 17195 found at Wed May 31 23:14:06 UTC 2017
selfserv with PID 17195 started at Wed May 31 23:14:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #976: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17195 at Wed May 31 23:14:07 UTC 2017
kill -USR1 17195
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17195 killed at Wed May 31 23:14:07 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:14:07 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17251 >/dev/null 2>/dev/null
selfserv with PID 17251 found at Wed May 31 23:14:07 UTC 2017
selfserv with PID 17251 started at Wed May 31 23:14:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #977: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17251 at Wed May 31 23:14:09 UTC 2017
kill -USR1 17251
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17251 killed at Wed May 31 23:14:09 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:14:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17319 >/dev/null 2>/dev/null
selfserv with PID 17319 found at Wed May 31 23:14:09 UTC 2017
selfserv with PID 17319 started at Wed May 31 23:14:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser40 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #978: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17319 at Wed May 31 23:14:10 UTC 2017
kill -USR1 17319
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17319 killed at Wed May 31 23:14:10 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:14:11 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17375 >/dev/null 2>/dev/null
selfserv with PID 17375 found at Wed May 31 23:14:11 UTC 2017
selfserv with PID 17375 started at Wed May 31 23:14:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser41 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #979: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17375 at Wed May 31 23:14:12 UTC 2017
kill -USR1 17375
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17375 killed at Wed May 31 23:14:12 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:14:12 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17431 >/dev/null 2>/dev/null
selfserv with PID 17431 found at Wed May 31 23:14:12 UTC 2017
selfserv with PID 17431 started at Wed May 31 23:14:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser42 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #980: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17431 at Wed May 31 23:14:14 UTC 2017
kill -USR1 17431
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17431 killed at Wed May 31 23:14:14 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:14:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17499 >/dev/null 2>/dev/null
selfserv with PID 17499 found at Wed May 31 23:14:14 UTC 2017
selfserv with PID 17499 started at Wed May 31 23:14:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #981: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17499 at Wed May 31 23:14:15 UTC 2017
kill -USR1 17499
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17499 killed at Wed May 31 23:14:15 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:14:16 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17555 >/dev/null 2>/dev/null
selfserv with PID 17555 found at Wed May 31 23:14:16 UTC 2017
selfserv with PID 17555 started at Wed May 31 23:14:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #982: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 17555 at Wed May 31 23:14:17 UTC 2017
kill -USR1 17555
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17555 killed at Wed May 31 23:14:17 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:14:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17611 >/dev/null 2>/dev/null
selfserv with PID 17611 found at Wed May 31 23:14:17 UTC 2017
selfserv with PID 17611 started at Wed May 31 23:14:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #983: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17611 at Wed May 31 23:14:19 UTC 2017
kill -USR1 17611
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17611 killed at Wed May 31 23:14:19 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:14:19 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17679 >/dev/null 2>/dev/null
selfserv with PID 17679 found at Wed May 31 23:14:19 UTC 2017
selfserv with PID 17679 started at Wed May 31 23:14:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #984: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17679 at Wed May 31 23:14:20 UTC 2017
kill -USR1 17679
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17679 killed at Wed May 31 23:14:20 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:14:21 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17735 >/dev/null 2>/dev/null
selfserv with PID 17735 found at Wed May 31 23:14:21 UTC 2017
selfserv with PID 17735 started at Wed May 31 23:14:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #985: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17735 at Wed May 31 23:14:22 UTC 2017
kill -USR1 17735
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17735 killed at Wed May 31 23:14:22 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:14:22 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17791 >/dev/null 2>/dev/null
selfserv with PID 17791 found at Wed May 31 23:14:22 UTC 2017
selfserv with PID 17791 started at Wed May 31 23:14:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #986: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17791 at Wed May 31 23:14:23 UTC 2017
kill -USR1 17791
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17791 killed at Wed May 31 23:14:24 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:14:24 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17859 >/dev/null 2>/dev/null
selfserv with PID 17859 found at Wed May 31 23:14:24 UTC 2017
selfserv with PID 17859 started at Wed May 31 23:14:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser40 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #987: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17859 at Wed May 31 23:14:25 UTC 2017
kill -USR1 17859
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17859 killed at Wed May 31 23:14:25 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:14:25 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17915 >/dev/null 2>/dev/null
selfserv with PID 17915 found at Wed May 31 23:14:25 UTC 2017
selfserv with PID 17915 started at Wed May 31 23:14:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser41 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #988: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17915 at Wed May 31 23:14:27 UTC 2017
kill -USR1 17915
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17915 killed at Wed May 31 23:14:27 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:14:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17971 >/dev/null 2>/dev/null
selfserv with PID 17971 found at Wed May 31 23:14:27 UTC 2017
selfserv with PID 17971 started at Wed May 31 23:14:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser42 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #989: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 17971 at Wed May 31 23:14:28 UTC 2017
kill -USR1 17971
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17971 killed at Wed May 31 23:14:28 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:14:29 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18039 >/dev/null 2>/dev/null
selfserv with PID 18039 found at Wed May 31 23:14:29 UTC 2017
selfserv with PID 18039 started at Wed May 31 23:14:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #990: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18039 at Wed May 31 23:14:30 UTC 2017
kill -USR1 18039
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18039 killed at Wed May 31 23:14:30 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:14:30 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18095 >/dev/null 2>/dev/null
selfserv with PID 18095 found at Wed May 31 23:14:30 UTC 2017
selfserv with PID 18095 started at Wed May 31 23:14:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #991: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18095 at Wed May 31 23:14:32 UTC 2017
kill -USR1 18095
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18095 killed at Wed May 31 23:14:32 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:14:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18151 >/dev/null 2>/dev/null
selfserv with PID 18151 found at Wed May 31 23:14:32 UTC 2017
selfserv with PID 18151 started at Wed May 31 23:14:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #992: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18151 at Wed May 31 23:14:34 UTC 2017
kill -USR1 18151
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18151 killed at Wed May 31 23:14:34 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:14:34 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18219 >/dev/null 2>/dev/null
selfserv with PID 18219 found at Wed May 31 23:14:34 UTC 2017
selfserv with PID 18219 started at Wed May 31 23:14:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #993: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18219 at Wed May 31 23:14:35 UTC 2017
kill -USR1 18219
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18219 killed at Wed May 31 23:14:35 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:14:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18275 >/dev/null 2>/dev/null
selfserv with PID 18275 found at Wed May 31 23:14:35 UTC 2017
selfserv with PID 18275 started at Wed May 31 23:14:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #994: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18275 at Wed May 31 23:14:37 UTC 2017
kill -USR1 18275
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18275 killed at Wed May 31 23:14:37 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:14:37 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18331 >/dev/null 2>/dev/null
selfserv with PID 18331 found at Wed May 31 23:14:37 UTC 2017
selfserv with PID 18331 started at Wed May 31 23:14:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #995: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18331 at Wed May 31 23:14:38 UTC 2017
kill -USR1 18331
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18331 killed at Wed May 31 23:14:38 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:14:38 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18399 >/dev/null 2>/dev/null
selfserv with PID 18399 found at Wed May 31 23:14:38 UTC 2017
selfserv with PID 18399 started at Wed May 31 23:14:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #996: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18399 at Wed May 31 23:14:39 UTC 2017
kill -USR1 18399
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18399 killed at Wed May 31 23:14:39 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:14:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18455 >/dev/null 2>/dev/null
selfserv with PID 18455 found at Wed May 31 23:14:39 UTC 2017
selfserv with PID 18455 started at Wed May 31 23:14:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #997: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18455 at Wed May 31 23:14:41 UTC 2017
kill -USR1 18455
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18455 killed at Wed May 31 23:14:41 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:14:41 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18511 >/dev/null 2>/dev/null
selfserv with PID 18511 found at Wed May 31 23:14:41 UTC 2017
selfserv with PID 18511 started at Wed May 31 23:14:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #998: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18511 at Wed May 31 23:14:42 UTC 2017
kill -USR1 18511
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18511 killed at Wed May 31 23:14:42 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:14:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18579 >/dev/null 2>/dev/null
selfserv with PID 18579 found at Wed May 31 23:14:42 UTC 2017
selfserv with PID 18579 started at Wed May 31 23:14:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #999: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18579 at Wed May 31 23:14:43 UTC 2017
kill -USR1 18579
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18579 killed at Wed May 31 23:14:43 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:14:43 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18635 >/dev/null 2>/dev/null
selfserv with PID 18635 found at Wed May 31 23:14:43 UTC 2017
selfserv with PID 18635 started at Wed May 31 23:14:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1000: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18635 at Wed May 31 23:14:45 UTC 2017
kill -USR1 18635
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18635 killed at Wed May 31 23:14:45 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:14:45 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18691 >/dev/null 2>/dev/null
selfserv with PID 18691 found at Wed May 31 23:14:45 UTC 2017
selfserv with PID 18691 started at Wed May 31 23:14:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1001: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18691 at Wed May 31 23:14:46 UTC 2017
kill -USR1 18691
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18691 killed at Wed May 31 23:14:46 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:14:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18759 >/dev/null 2>/dev/null
selfserv with PID 18759 found at Wed May 31 23:14:46 UTC 2017
selfserv with PID 18759 started at Wed May 31 23:14:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1002: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18759 at Wed May 31 23:14:47 UTC 2017
kill -USR1 18759
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18759 killed at Wed May 31 23:14:47 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:14:47 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18815 >/dev/null 2>/dev/null
selfserv with PID 18815 found at Wed May 31 23:14:47 UTC 2017
selfserv with PID 18815 started at Wed May 31 23:14:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1003: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18815 at Wed May 31 23:14:49 UTC 2017
kill -USR1 18815
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18815 killed at Wed May 31 23:14:49 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:14:49 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18871 >/dev/null 2>/dev/null
selfserv with PID 18871 found at Wed May 31 23:14:49 UTC 2017
selfserv with PID 18871 started at Wed May 31 23:14:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1004: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18871 at Wed May 31 23:14:50 UTC 2017
kill -USR1 18871
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18871 killed at Wed May 31 23:14:50 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:14:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18939 >/dev/null 2>/dev/null
selfserv with PID 18939 found at Wed May 31 23:14:50 UTC 2017
selfserv with PID 18939 started at Wed May 31 23:14:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1005: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18939 at Wed May 31 23:14:51 UTC 2017
kill -USR1 18939
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18939 killed at Wed May 31 23:14:51 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:14:51 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18995 >/dev/null 2>/dev/null
selfserv with PID 18995 found at Wed May 31 23:14:51 UTC 2017
selfserv with PID 18995 started at Wed May 31 23:14:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1006: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18995 at Wed May 31 23:14:52 UTC 2017
kill -USR1 18995
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18995 killed at Wed May 31 23:14:52 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:14:53 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19051 >/dev/null 2>/dev/null
selfserv with PID 19051 found at Wed May 31 23:14:53 UTC 2017
selfserv with PID 19051 started at Wed May 31 23:14:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1007: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19051 at Wed May 31 23:14:54 UTC 2017
kill -USR1 19051
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19051 killed at Wed May 31 23:14:54 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:14:54 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19119 >/dev/null 2>/dev/null
selfserv with PID 19119 found at Wed May 31 23:14:54 UTC 2017
selfserv with PID 19119 started at Wed May 31 23:14:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1008: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19119 at Wed May 31 23:14:55 UTC 2017
kill -USR1 19119
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19119 killed at Wed May 31 23:14:55 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:14:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19175 >/dev/null 2>/dev/null
selfserv with PID 19175 found at Wed May 31 23:14:55 UTC 2017
selfserv with PID 19175 started at Wed May 31 23:14:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1009: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19175 at Wed May 31 23:14:56 UTC 2017
kill -USR1 19175
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19175 killed at Wed May 31 23:14:56 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:14:56 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19231 >/dev/null 2>/dev/null
selfserv with PID 19231 found at Wed May 31 23:14:57 UTC 2017
selfserv with PID 19231 started at Wed May 31 23:14:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1010: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19231 at Wed May 31 23:14:58 UTC 2017
kill -USR1 19231
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19231 killed at Wed May 31 23:14:58 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed May 31 23:14:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19308 >/dev/null 2>/dev/null
selfserv with PID 19308 found at Wed May 31 23:14:58 UTC 2017
selfserv with PID 19308 started at Wed May 31 23:14:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser40-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1011: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19308 at Wed May 31 23:14:59 UTC 2017
kill -USR1 19308
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19308 killed at Wed May 31 23:14:59 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed May 31 23:14:59 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:14:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19364 >/dev/null 2>/dev/null
selfserv with PID 19364 found at Wed May 31 23:14:59 UTC 2017
selfserv with PID 19364 started at Wed May 31 23:14:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser41-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1012: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19364 at Wed May 31 23:15:00 UTC 2017
kill -USR1 19364
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19364 killed at Wed May 31 23:15:00 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed May 31 23:15:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19420 >/dev/null 2>/dev/null
selfserv with PID 19420 found at Wed May 31 23:15:01 UTC 2017
selfserv with PID 19420 started at Wed May 31 23:15:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser42-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1013: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19420 at Wed May 31 23:15:02 UTC 2017
kill -USR1 19420
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19420 killed at Wed May 31 23:15:02 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed May 31 23:15:02 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19494 >/dev/null 2>/dev/null
selfserv with PID 19494 found at Wed May 31 23:15:02 UTC 2017
selfserv with PID 19494 started at Wed May 31 23:15:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser40-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1014: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 19494 at Wed May 31 23:15:03 UTC 2017
kill -USR1 19494
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19494 killed at Wed May 31 23:15:03 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed May 31 23:15:03 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19599 >/dev/null 2>/dev/null
selfserv with PID 19599 found at Wed May 31 23:15:03 UTC 2017
selfserv with PID 19599 started at Wed May 31 23:15:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1015: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19599 at Wed May 31 23:15:05 UTC 2017
kill -USR1 19599
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19599 killed at Wed May 31 23:15:05 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed May 31 23:15:05 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19682 >/dev/null 2>/dev/null
selfserv with PID 19682 found at Wed May 31 23:15:05 UTC 2017
selfserv with PID 19682 started at Wed May 31 23:15:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser42-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1016: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 19682 at Wed May 31 23:15:06 UTC 2017
kill -USR1 19682
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19682 killed at Wed May 31 23:15:06 UTC 2017
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Wed May 31 23:15:06 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19752 >/dev/null 2>/dev/null
selfserv with PID 19752 found at Wed May 31 23:15:06 UTC 2017
selfserv with PID 19752 started at Wed May 31 23:15:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser40-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1017: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 19752 at Wed May 31 23:15:07 UTC 2017
kill -USR1 19752
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19752 killed at Wed May 31 23:15:07 UTC 2017
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Wed May 31 23:15:08 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19843 >/dev/null 2>/dev/null
selfserv with PID 19843 found at Wed May 31 23:15:08 UTC 2017
selfserv with PID 19843 started at Wed May 31 23:15:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser41-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1018: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 19843 at Wed May 31 23:15:09 UTC 2017
kill -USR1 19843
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19843 killed at Wed May 31 23:15:09 UTC 2017
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Wed May 31 23:15:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19900 >/dev/null 2>/dev/null
selfserv with PID 19900 found at Wed May 31 23:15:09 UTC 2017
selfserv with PID 19900 started at Wed May 31 23:15:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser42-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1019: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 19900 at Wed May 31 23:15:10 UTC 2017
kill -USR1 19900
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19900 killed at Wed May 31 23:15:10 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed May 31 23:15:10 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20055 >/dev/null 2>/dev/null
selfserv with PID 20055 found at Wed May 31 23:15:10 UTC 2017
selfserv with PID 20055 started at Wed May 31 23:15:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser40-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1020: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 20055 at Wed May 31 23:15:11 UTC 2017
kill -USR1 20055
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20055 killed at Wed May 31 23:15:11 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed May 31 23:15:12 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20149 >/dev/null 2>/dev/null
selfserv with PID 20149 found at Wed May 31 23:15:12 UTC 2017
selfserv with PID 20149 started at Wed May 31 23:15:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1021: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20149 at Wed May 31 23:15:13 UTC 2017
kill -USR1 20149
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20149 killed at Wed May 31 23:15:13 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed May 31 23:15:13 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20229 >/dev/null 2>/dev/null
selfserv with PID 20229 found at Wed May 31 23:15:13 UTC 2017
selfserv with PID 20229 started at Wed May 31 23:15:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser42-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1022: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 20229 at Wed May 31 23:15:14 UTC 2017
kill -USR1 20229
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20229 killed at Wed May 31 23:15:14 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed May 31 23:15:15 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20301 >/dev/null 2>/dev/null
selfserv with PID 20301 found at Wed May 31 23:15:15 UTC 2017
selfserv with PID 20301 started at Wed May 31 23:15:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1023: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20301 at Wed May 31 23:15:16 UTC 2017
kill -USR1 20301
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20301 killed at Wed May 31 23:15:16 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed May 31 23:15:16 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20369 >/dev/null 2>/dev/null
selfserv with PID 20369 found at Wed May 31 23:15:16 UTC 2017
selfserv with PID 20369 started at Wed May 31 23:15:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1024: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20369 at Wed May 31 23:15:17 UTC 2017
kill -USR1 20369
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20369 killed at Wed May 31 23:15:17 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed May 31 23:15:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20425 >/dev/null 2>/dev/null
selfserv with PID 20425 found at Wed May 31 23:15:17 UTC 2017
selfserv with PID 20425 started at Wed May 31 23:15:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1025: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20425 at Wed May 31 23:15:18 UTC 2017
kill -USR1 20425
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20425 killed at Wed May 31 23:15:18 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed May 31 23:15:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20494 >/dev/null 2>/dev/null
selfserv with PID 20494 found at Wed May 31 23:15:18 UTC 2017
selfserv with PID 20494 started at Wed May 31 23:15:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1026: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 20494 at Wed May 31 23:15:19 UTC 2017
kill -USR1 20494
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20494 killed at Wed May 31 23:15:19 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed May 31 23:15:19 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20550 >/dev/null 2>/dev/null
selfserv with PID 20550 found at Wed May 31 23:15:20 UTC 2017
selfserv with PID 20550 started at Wed May 31 23:15:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1027: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20550 at Wed May 31 23:15:21 UTC 2017
kill -USR1 20550
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20550 killed at Wed May 31 23:15:21 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed May 31 23:15:21 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20623 >/dev/null 2>/dev/null
selfserv with PID 20623 found at Wed May 31 23:15:21 UTC 2017
selfserv with PID 20623 started at Wed May 31 23:15:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1028: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 20623 at Wed May 31 23:15:22 UTC 2017
kill -USR1 20623
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20623 killed at Wed May 31 23:15:22 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Wed May 31 23:15:22 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20692 >/dev/null 2>/dev/null
selfserv with PID 20692 found at Wed May 31 23:15:22 UTC 2017
selfserv with PID 20692 started at Wed May 31 23:15:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1029: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 20692 at Wed May 31 23:15:23 UTC 2017
kill -USR1 20692
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20692 killed at Wed May 31 23:15:23 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Wed May 31 23:15:23 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20854 >/dev/null 2>/dev/null
selfserv with PID 20854 found at Wed May 31 23:15:24 UTC 2017
selfserv with PID 20854 started at Wed May 31 23:15:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1030: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 20854 at Wed May 31 23:15:24 UTC 2017
kill -USR1 20854
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20854 killed at Wed May 31 23:15:24 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Wed May 31 23:15:25 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20910 >/dev/null 2>/dev/null
selfserv with PID 20910 found at Wed May 31 23:15:25 UTC 2017
selfserv with PID 20910 started at Wed May 31 23:15:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1031: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 20910 at Wed May 31 23:15:25 UTC 2017
kill -USR1 20910
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20910 killed at Wed May 31 23:15:25 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed May 31 23:15:26 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20978 >/dev/null 2>/dev/null
selfserv with PID 20978 found at Wed May 31 23:15:26 UTC 2017
selfserv with PID 20978 started at Wed May 31 23:15:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1032: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 20978 at Wed May 31 23:15:27 UTC 2017
kill -USR1 20978
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20978 killed at Wed May 31 23:15:27 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed May 31 23:15:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21034 >/dev/null 2>/dev/null
selfserv with PID 21034 found at Wed May 31 23:15:27 UTC 2017
selfserv with PID 21034 started at Wed May 31 23:15:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1033: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21034 at Wed May 31 23:15:28 UTC 2017
kill -USR1 21034
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21034 killed at Wed May 31 23:15:28 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed May 31 23:15:28 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21090 >/dev/null 2>/dev/null
selfserv with PID 21090 found at Wed May 31 23:15:28 UTC 2017
selfserv with PID 21090 started at Wed May 31 23:15:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
ssl.sh: #1034: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 21090 at Wed May 31 23:15:30 UTC 2017
kill -USR1 21090
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21090 killed at Wed May 31 23:15:30 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:15:30 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21158 >/dev/null 2>/dev/null
selfserv with PID 21158 found at Wed May 31 23:15:30 UTC 2017
selfserv with PID 21158 started at Wed May 31 23:15:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser40-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1035: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21158 at Wed May 31 23:15:31 UTC 2017
kill -USR1 21158
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21158 killed at Wed May 31 23:15:31 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:15:31 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21214 >/dev/null 2>/dev/null
selfserv with PID 21214 found at Wed May 31 23:15:31 UTC 2017
selfserv with PID 21214 started at Wed May 31 23:15:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser41-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1036: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21214 at Wed May 31 23:15:32 UTC 2017
kill -USR1 21214
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21214 killed at Wed May 31 23:15:32 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:15:33 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21270 >/dev/null 2>/dev/null
selfserv with PID 21270 found at Wed May 31 23:15:33 UTC 2017
selfserv with PID 21270 started at Wed May 31 23:15:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser42-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1037: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21270 at Wed May 31 23:15:34 UTC 2017
kill -USR1 21270
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21270 killed at Wed May 31 23:15:34 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:15:34 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21338 >/dev/null 2>/dev/null
selfserv with PID 21338 found at Wed May 31 23:15:34 UTC 2017
selfserv with PID 21338 started at Wed May 31 23:15:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser40-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1038: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21338 at Wed May 31 23:15:35 UTC 2017
kill -USR1 21338
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21338 killed at Wed May 31 23:15:35 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:15:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21394 >/dev/null 2>/dev/null
selfserv with PID 21394 found at Wed May 31 23:15:36 UTC 2017
selfserv with PID 21394 started at Wed May 31 23:15:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1039: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21394 at Wed May 31 23:15:37 UTC 2017
kill -USR1 21394
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21394 killed at Wed May 31 23:15:37 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:15:37 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21450 >/dev/null 2>/dev/null
selfserv with PID 21450 found at Wed May 31 23:15:37 UTC 2017
selfserv with PID 21450 started at Wed May 31 23:15:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser42-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1040: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21450 at Wed May 31 23:15:39 UTC 2017
kill -USR1 21450
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21450 killed at Wed May 31 23:15:39 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:15:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21518 >/dev/null 2>/dev/null
selfserv with PID 21518 found at Wed May 31 23:15:39 UTC 2017
selfserv with PID 21518 started at Wed May 31 23:15:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser40-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1041: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21518 at Wed May 31 23:15:40 UTC 2017
kill -USR1 21518
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21518 killed at Wed May 31 23:15:40 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:15:40 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21574 >/dev/null 2>/dev/null
selfserv with PID 21574 found at Wed May 31 23:15:40 UTC 2017
selfserv with PID 21574 started at Wed May 31 23:15:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser41-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1042: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21574 at Wed May 31 23:15:41 UTC 2017
kill -USR1 21574
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21574 killed at Wed May 31 23:15:41 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:15:41 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21630 >/dev/null 2>/dev/null
selfserv with PID 21630 found at Wed May 31 23:15:41 UTC 2017
selfserv with PID 21630 started at Wed May 31 23:15:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser42-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1043: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21630 at Wed May 31 23:15:43 UTC 2017
kill -USR1 21630
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21630 killed at Wed May 31 23:15:43 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:15:43 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21698 >/dev/null 2>/dev/null
selfserv with PID 21698 found at Wed May 31 23:15:43 UTC 2017
selfserv with PID 21698 started at Wed May 31 23:15:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser40-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1044: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21698 at Wed May 31 23:15:44 UTC 2017
kill -USR1 21698
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21698 killed at Wed May 31 23:15:44 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:15:44 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21754 >/dev/null 2>/dev/null
selfserv with PID 21754 found at Wed May 31 23:15:44 UTC 2017
selfserv with PID 21754 started at Wed May 31 23:15:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1045: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21754 at Wed May 31 23:15:46 UTC 2017
kill -USR1 21754
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21754 killed at Wed May 31 23:15:46 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:15:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21812 >/dev/null 2>/dev/null
selfserv with PID 21812 found at Wed May 31 23:15:46 UTC 2017
selfserv with PID 21812 started at Wed May 31 23:15:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser42-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1046: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21812 at Wed May 31 23:15:47 UTC 2017
kill -USR1 21812
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21812 killed at Wed May 31 23:15:47 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:15:48 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21880 >/dev/null 2>/dev/null
selfserv with PID 21880 found at Wed May 31 23:15:48 UTC 2017
selfserv with PID 21880 started at Wed May 31 23:15:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser40-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1047: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21880 at Wed May 31 23:15:49 UTC 2017
kill -USR1 21880
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21880 killed at Wed May 31 23:15:49 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:15:49 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21936 >/dev/null 2>/dev/null
selfserv with PID 21936 found at Wed May 31 23:15:49 UTC 2017
selfserv with PID 21936 started at Wed May 31 23:15:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser41-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1048: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21936 at Wed May 31 23:15:51 UTC 2017
kill -USR1 21936
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21936 killed at Wed May 31 23:15:51 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:15:51 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21992 >/dev/null 2>/dev/null
selfserv with PID 21992 found at Wed May 31 23:15:51 UTC 2017
selfserv with PID 21992 started at Wed May 31 23:15:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser42-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1049: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21992 at Wed May 31 23:15:52 UTC 2017
kill -USR1 21992
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21992 killed at Wed May 31 23:15:52 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:15:53 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22060 >/dev/null 2>/dev/null
selfserv with PID 22060 found at Wed May 31 23:15:53 UTC 2017
selfserv with PID 22060 started at Wed May 31 23:15:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1050: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22060 at Wed May 31 23:15:54 UTC 2017
kill -USR1 22060
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22060 killed at Wed May 31 23:15:54 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:15:54 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22116 >/dev/null 2>/dev/null
selfserv with PID 22116 found at Wed May 31 23:15:54 UTC 2017
selfserv with PID 22116 started at Wed May 31 23:15:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1051: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22116 at Wed May 31 23:15:56 UTC 2017
kill -USR1 22116
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22116 killed at Wed May 31 23:15:56 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:15:56 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22172 >/dev/null 2>/dev/null
selfserv with PID 22172 found at Wed May 31 23:15:56 UTC 2017
selfserv with PID 22172 started at Wed May 31 23:15:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1052: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22172 at Wed May 31 23:15:58 UTC 2017
kill -USR1 22172
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22172 killed at Wed May 31 23:15:58 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:15:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:15:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22240 >/dev/null 2>/dev/null
selfserv with PID 22240 found at Wed May 31 23:15:58 UTC 2017
selfserv with PID 22240 started at Wed May 31 23:15:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser40-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1053: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22240 at Wed May 31 23:16:00 UTC 2017
kill -USR1 22240
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22240 killed at Wed May 31 23:16:00 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:16:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:16:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22296 >/dev/null 2>/dev/null
selfserv with PID 22296 found at Wed May 31 23:16:00 UTC 2017
selfserv with PID 22296 started at Wed May 31 23:16:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser41-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1054: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22296 at Wed May 31 23:16:01 UTC 2017
kill -USR1 22296
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22296 killed at Wed May 31 23:16:01 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:16:02 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:16:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22353 >/dev/null 2>/dev/null
selfserv with PID 22353 found at Wed May 31 23:16:02 UTC 2017
selfserv with PID 22353 started at Wed May 31 23:16:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser42-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1055: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22353 at Wed May 31 23:16:03 UTC 2017
kill -USR1 22353
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22353 killed at Wed May 31 23:16:03 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:16:03 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:16:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22421 >/dev/null 2>/dev/null
selfserv with PID 22421 found at Wed May 31 23:16:03 UTC 2017
selfserv with PID 22421 started at Wed May 31 23:16:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1056: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22421 at Wed May 31 23:16:05 UTC 2017
kill -USR1 22421
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22421 killed at Wed May 31 23:16:05 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:16:05 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:16:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22478 >/dev/null 2>/dev/null
selfserv with PID 22478 found at Wed May 31 23:16:05 UTC 2017
selfserv with PID 22478 started at Wed May 31 23:16:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1057: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22478 at Wed May 31 23:16:07 UTC 2017
kill -USR1 22478
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22478 killed at Wed May 31 23:16:07 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:16:07 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:16:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22534 >/dev/null 2>/dev/null
selfserv with PID 22534 found at Wed May 31 23:16:07 UTC 2017
selfserv with PID 22534 started at Wed May 31 23:16:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1058: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22534 at Wed May 31 23:16:08 UTC 2017
kill -USR1 22534
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22534 killed at Wed May 31 23:16:08 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:16:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:16:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22602 >/dev/null 2>/dev/null
selfserv with PID 22602 found at Wed May 31 23:16:09 UTC 2017
selfserv with PID 22602 started at Wed May 31 23:16:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1059: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22602 at Wed May 31 23:16:10 UTC 2017
kill -USR1 22602
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22602 killed at Wed May 31 23:16:10 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:16:10 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:16:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22658 >/dev/null 2>/dev/null
selfserv with PID 22658 found at Wed May 31 23:16:10 UTC 2017
selfserv with PID 22658 started at Wed May 31 23:16:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1060: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22658 at Wed May 31 23:16:11 UTC 2017
kill -USR1 22658
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22658 killed at Wed May 31 23:16:11 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:16:11 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:16:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22714 >/dev/null 2>/dev/null
selfserv with PID 22714 found at Wed May 31 23:16:11 UTC 2017
selfserv with PID 22714 started at Wed May 31 23:16:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1061: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22714 at Wed May 31 23:16:12 UTC 2017
kill -USR1 22714
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22714 killed at Wed May 31 23:16:12 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:16:13 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:16:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22782 >/dev/null 2>/dev/null
selfserv with PID 22782 found at Wed May 31 23:16:13 UTC 2017
selfserv with PID 22782 started at Wed May 31 23:16:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1062: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22782 at Wed May 31 23:16:14 UTC 2017
kill -USR1 22782
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22782 killed at Wed May 31 23:16:14 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:16:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:16:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22838 >/dev/null 2>/dev/null
selfserv with PID 22838 found at Wed May 31 23:16:14 UTC 2017
selfserv with PID 22838 started at Wed May 31 23:16:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1063: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22838 at Wed May 31 23:16:15 UTC 2017
kill -USR1 22838
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22838 killed at Wed May 31 23:16:15 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:16:16 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:16:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22894 >/dev/null 2>/dev/null
selfserv with PID 22894 found at Wed May 31 23:16:16 UTC 2017
selfserv with PID 22894 started at Wed May 31 23:16:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1064: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22894 at Wed May 31 23:16:17 UTC 2017
kill -USR1 22894
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22894 killed at Wed May 31 23:16:17 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:16:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:16:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22962 >/dev/null 2>/dev/null
selfserv with PID 22962 found at Wed May 31 23:16:17 UTC 2017
selfserv with PID 22962 started at Wed May 31 23:16:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1065: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22962 at Wed May 31 23:16:18 UTC 2017
kill -USR1 22962
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22962 killed at Wed May 31 23:16:18 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:16:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:16:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23018 >/dev/null 2>/dev/null
selfserv with PID 23018 found at Wed May 31 23:16:18 UTC 2017
selfserv with PID 23018 started at Wed May 31 23:16:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1066: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23018 at Wed May 31 23:16:19 UTC 2017
kill -USR1 23018
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23018 killed at Wed May 31 23:16:19 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:16:20 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:16:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23074 >/dev/null 2>/dev/null
selfserv with PID 23074 found at Wed May 31 23:16:20 UTC 2017
selfserv with PID 23074 started at Wed May 31 23:16:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1067: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23074 at Wed May 31 23:16:21 UTC 2017
kill -USR1 23074
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23074 killed at Wed May 31 23:16:21 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:16:21 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:16:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23142 >/dev/null 2>/dev/null
selfserv with PID 23142 found at Wed May 31 23:16:21 UTC 2017
selfserv with PID 23142 started at Wed May 31 23:16:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1068: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23142 at Wed May 31 23:16:22 UTC 2017
kill -USR1 23142
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23142 killed at Wed May 31 23:16:22 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:16:22 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:16:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23199 >/dev/null 2>/dev/null
selfserv with PID 23199 found at Wed May 31 23:16:22 UTC 2017
selfserv with PID 23199 started at Wed May 31 23:16:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1069: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23199 at Wed May 31 23:16:24 UTC 2017
kill -USR1 23199
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23199 killed at Wed May 31 23:16:24 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:16:24 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:16:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23255 >/dev/null 2>/dev/null
selfserv with PID 23255 found at Wed May 31 23:16:24 UTC 2017
selfserv with PID 23255 started at Wed May 31 23:16:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
ssl.sh: #1070: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23255 at Wed May 31 23:16:25 UTC 2017
kill -USR1 23255
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23255 killed at Wed May 31 23:16:25 UTC 2017
ssl.sh: Cache CRL SSL Client Tests - with ECC ===============================
/<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/authin.tl.tmp
0
selfserv starting at Wed May 31 23:16:25 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:16:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:25 UTC 2017
selfserv with PID 23318 started at Wed May 31 23:16:25 UTC 2017
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser40 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:26 UTC 2017
ssl.sh: #1071: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:27 UTC 2017
ssl.sh: #1072: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser42 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:27 UTC 2017
ssl.sh: #1073: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser43 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:28 UTC 2017
ssl.sh: #1074: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser44 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:28 UTC 2017
ssl.sh: #1075: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser45 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:29 UTC 2017
ssl.sh: #1076: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser46 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:30 UTC 2017
ssl.sh: #1077: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser47 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:30 UTC 2017
ssl.sh: #1078: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser48 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:31 UTC 2017
ssl.sh: #1079: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser49 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:31 UTC 2017
ssl.sh: #1080: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser50 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:32 UTC 2017
ssl.sh: #1081: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser51 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:32 UTC 2017
ssl.sh: #1082: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser52 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:33 UTC 2017
ssl.sh: #1083: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_43-48
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:33 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1084: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser40 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:34 UTC 2017
ssl.sh: #1085: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:34 UTC 2017
ssl.sh: #1086: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser42 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:35 UTC 2017
ssl.sh: #1087: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser43 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:35 UTC 2017
ssl.sh: #1088: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser44 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:36 UTC 2017
ssl.sh: #1089: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser45 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:36 UTC 2017
ssl.sh: #1090: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser46 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:37 UTC 2017
ssl.sh: #1091: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser47 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:38 UTC 2017
ssl.sh: #1092: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser48 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:38 UTC 2017
ssl.sh: #1093: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser49 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:39 UTC 2017
ssl.sh: #1094: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser50 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:39 UTC 2017
ssl.sh: #1095: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser51 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:40 UTC 2017
ssl.sh: #1096: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser52 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:40 UTC 2017
ssl.sh: #1097: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_49-52
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:41 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1098: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser40 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:41 UTC 2017
ssl.sh: #1099: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:42 UTC 2017
ssl.sh: #1100: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser42 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:42 UTC 2017
ssl.sh: #1101: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser43 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:43 UTC 2017
ssl.sh: #1102: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser44 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:43 UTC 2017
ssl.sh: #1103: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser45 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:44 UTC 2017
ssl.sh: #1104: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser46 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:45 UTC 2017
ssl.sh: #1105: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser47 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:45 UTC 2017
ssl.sh: #1106: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser48 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:46 UTC 2017
ssl.sh: #1107: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser49 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:46 UTC 2017
ssl.sh: #1108: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser50 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:47 UTC 2017
ssl.sh: #1109: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser51 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:47 UTC 2017
ssl.sh: #1110: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser52 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 23318 >/dev/null 2>/dev/null
selfserv with PID 23318 found at Wed May 31 23:16:48 UTC 2017
ssl.sh: #1111: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 23318 at Wed May 31 23:16:48 UTC 2017
kill -USR1 23318
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23318 killed at Wed May 31 23:16:48 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed May 31 23:16:48 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:16:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:16:48 UTC 2017
selfserv with PID 24746 started at Wed May 31 23:16:48 UTC 2017
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:16:49 UTC 2017
ssl.sh: #1112: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:16:50 UTC 2017
ssl.sh: #1113: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:16:50 UTC 2017
ssl.sh: #1114: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser43 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:16:51 UTC 2017
ssl.sh: #1115: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser44 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:16:51 UTC 2017
ssl.sh: #1116: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser45 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:16:52 UTC 2017
ssl.sh: #1117: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser46 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:16:52 UTC 2017
ssl.sh: #1118: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser47 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:16:53 UTC 2017
ssl.sh: #1119: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser48 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:16:53 UTC 2017
ssl.sh: #1120: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser49 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:16:54 UTC 2017
ssl.sh: #1121: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser50 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:16:54 UTC 2017
ssl.sh: #1122: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser51 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:16:55 UTC 2017
ssl.sh: #1123: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser52 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:16:55 UTC 2017
ssl.sh: #1124: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_43-48
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:16:56 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1125: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:16:56 UTC 2017
ssl.sh: #1126: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:16:57 UTC 2017
ssl.sh: #1127: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:16:57 UTC 2017
ssl.sh: #1128: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser43 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:16:58 UTC 2017
ssl.sh: #1129: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser44 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:16:58 UTC 2017
ssl.sh: #1130: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser45 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:16:59 UTC 2017
ssl.sh: #1131: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser46 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:16:59 UTC 2017
ssl.sh: #1132: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser47 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:17:00 UTC 2017
ssl.sh: #1133: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser48 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:17:00 UTC 2017
ssl.sh: #1134: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser49 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:17:01 UTC 2017
ssl.sh: #1135: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser50 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:17:01 UTC 2017
ssl.sh: #1136: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser51 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:17:02 UTC 2017
ssl.sh: #1137: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser52 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:17:03 UTC 2017
ssl.sh: #1138: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_49-52
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:17:03 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1139: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:17:03 UTC 2017
ssl.sh: #1140: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:17:04 UTC 2017
ssl.sh: #1141: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:17:04 UTC 2017
ssl.sh: #1142: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser43 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:17:05 UTC 2017
ssl.sh: #1143: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser44 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:17:05 UTC 2017
ssl.sh: #1144: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser45 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:17:06 UTC 2017
ssl.sh: #1145: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser46 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:17:06 UTC 2017
ssl.sh: #1146: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser47 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:17:07 UTC 2017
ssl.sh: #1147: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser48 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:17:07 UTC 2017
ssl.sh: #1148: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser49 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:17:08 UTC 2017
ssl.sh: #1149: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser50 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:17:08 UTC 2017
ssl.sh: #1150: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser51 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:17:09 UTC 2017
ssl.sh: #1151: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser52 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 24746 >/dev/null 2>/dev/null
selfserv with PID 24746 found at Wed May 31 23:17:09 UTC 2017
ssl.sh: #1152: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 24746 at Wed May 31 23:17:10 UTC 2017
kill -USR1 24746
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24746 killed at Wed May 31 23:17:10 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed May 31 23:17:10 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:17:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:10 UTC 2017
selfserv with PID 26172 started at Wed May 31 23:17:10 UTC 2017
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser40-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:11 UTC 2017
ssl.sh: #1153: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:11 UTC 2017
ssl.sh: #1154: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser42-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:12 UTC 2017
ssl.sh: #1155: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser43-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:13 UTC 2017
ssl.sh: #1156: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser44-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:13 UTC 2017
ssl.sh: #1157: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser45-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:14 UTC 2017
ssl.sh: #1158: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser46-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:14 UTC 2017
ssl.sh: #1159: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser47-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:15 UTC 2017
ssl.sh: #1160: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser48-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:16 UTC 2017
ssl.sh: #1161: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser49-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:16 UTC 2017
ssl.sh: #1162: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser50-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:17 UTC 2017
ssl.sh: #1163: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser51-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:18 UTC 2017
ssl.sh: #1164: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser52-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:18 UTC 2017
ssl.sh: #1165: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_43-48-ec
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 102 bytes
tstclnt: Writing 102 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:19 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1166: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser40-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:20 UTC 2017
ssl.sh: #1167: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:20 UTC 2017
ssl.sh: #1168: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser42-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:21 UTC 2017
ssl.sh: #1169: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser43-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:21 UTC 2017
ssl.sh: #1170: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser44-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:22 UTC 2017
ssl.sh: #1171: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser45-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:22 UTC 2017
ssl.sh: #1172: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser46-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:23 UTC 2017
ssl.sh: #1173: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser47-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:24 UTC 2017
ssl.sh: #1174: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser48-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:24 UTC 2017
ssl.sh: #1175: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser49-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:25 UTC 2017
ssl.sh: #1176: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser50-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:26 UTC 2017
ssl.sh: #1177: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser51-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:26 UTC 2017
ssl.sh: #1178: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser52-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:27 UTC 2017
ssl.sh: #1179: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_49-52-ec
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 102 bytes
tstclnt: Writing 102 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:27 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1180: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser40-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:28 UTC 2017
ssl.sh: #1181: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:29 UTC 2017
ssl.sh: #1182: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser42-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:29 UTC 2017
ssl.sh: #1183: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser43-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:30 UTC 2017
ssl.sh: #1184: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser44-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:30 UTC 2017
ssl.sh: #1185: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser45-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:31 UTC 2017
ssl.sh: #1186: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser46-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:31 UTC 2017
ssl.sh: #1187: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser47-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:32 UTC 2017
ssl.sh: #1188: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser48-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:33 UTC 2017
ssl.sh: #1189: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser49-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:33 UTC 2017
ssl.sh: #1190: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser50-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:34 UTC 2017
ssl.sh: #1191: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser51-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:34 UTC 2017
ssl.sh: #1192: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser52-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 26172 >/dev/null 2>/dev/null
selfserv with PID 26172 found at Wed May 31 23:17:35 UTC 2017
ssl.sh: #1193: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 26172 at Wed May 31 23:17:35 UTC 2017
kill -USR1 26172
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26172 killed at Wed May 31 23:17:35 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed May 31 23:17:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:17:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:35 UTC 2017
selfserv with PID 27595 started at Wed May 31 23:17:35 UTC 2017
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:36 UTC 2017
ssl.sh: #1194: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:37 UTC 2017
ssl.sh: #1195: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:37 UTC 2017
ssl.sh: #1196: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser43-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:38 UTC 2017
ssl.sh: #1197: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser44-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:39 UTC 2017
ssl.sh: #1198: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser45-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:39 UTC 2017
ssl.sh: #1199: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser46-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:40 UTC 2017
ssl.sh: #1200: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser47-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:40 UTC 2017
ssl.sh: #1201: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser48-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:41 UTC 2017
ssl.sh: #1202: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser49-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:42 UTC 2017
ssl.sh: #1203: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser50-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:42 UTC 2017
ssl.sh: #1204: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser51-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:43 UTC 2017
ssl.sh: #1205: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser52-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:44 UTC 2017
ssl.sh: #1206: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_43-48-ec
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 102 bytes
tstclnt: Writing 102 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:44 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1207: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:45 UTC 2017
ssl.sh: #1208: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:45 UTC 2017
ssl.sh: #1209: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:46 UTC 2017
ssl.sh: #1210: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser43-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:46 UTC 2017
ssl.sh: #1211: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser44-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:47 UTC 2017
ssl.sh: #1212: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser45-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:47 UTC 2017
ssl.sh: #1213: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser46-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:48 UTC 2017
ssl.sh: #1214: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser47-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:49 UTC 2017
ssl.sh: #1215: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser48-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:49 UTC 2017
ssl.sh: #1216: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser49-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:50 UTC 2017
ssl.sh: #1217: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser50-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:50 UTC 2017
ssl.sh: #1218: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser51-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:51 UTC 2017
ssl.sh: #1219: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser52-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:52 UTC 2017
ssl.sh: #1220: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_49-52-ec
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 102 bytes
tstclnt: Writing 102 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:52 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1221: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:53 UTC 2017
ssl.sh: #1222: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:53 UTC 2017
ssl.sh: #1223: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:54 UTC 2017
ssl.sh: #1224: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser43-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:54 UTC 2017
ssl.sh: #1225: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser44-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:55 UTC 2017
ssl.sh: #1226: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser45-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:55 UTC 2017
ssl.sh: #1227: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser46-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:56 UTC 2017
ssl.sh: #1228: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser47-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:57 UTC 2017
ssl.sh: #1229: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser48-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:57 UTC 2017
ssl.sh: #1230: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser49-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:58 UTC 2017
ssl.sh: #1231: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser50-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:58 UTC 2017
ssl.sh: #1232: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser51-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:59 UTC 2017
ssl.sh: #1233: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser52-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 254
kill -0 27595 >/dev/null 2>/dev/null
selfserv with PID 27595 found at Wed May 31 23:17:59 UTC 2017
ssl.sh: #1234: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED
trying to kill selfserv with PID 27595 at Wed May 31 23:17:59 UTC 2017
kill -USR1 27595
selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27595 killed at Wed May 31 23:18:00 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed May 31 23:18:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:18:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29017 >/dev/null 2>/dev/null
selfserv with PID 29017 found at Wed May 31 23:18:00 UTC 2017
selfserv with PID 29017 started at Wed May 31 23:18:00 UTC 2017
trying to kill selfserv with PID 29017 at Wed May 31 23:18:00 UTC 2017
kill -USR1 29017
./ssl.sh: line 182: 29017 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss ${sparam} -i ${R_SERVERPID} -V ssl3:tls1.2 $verbose -H 1
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29017 killed at Wed May 31 23:18:00 UTC 2017
selfserv starting at Wed May 31 23:18:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:18:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:00 UTC 2017
selfserv with PID 29059 started at Wed May 31 23:18:00 UTC 2017
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser40 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:01 UTC 2017
ssl.sh: #1235: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:02 UTC 2017
ssl.sh: #1236: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser42 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:03 UTC 2017
ssl.sh: #1237: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser43 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:04 UTC 2017
ssl.sh: #1238: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser44 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:04 UTC 2017
ssl.sh: #1239: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser45 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:05 UTC 2017
ssl.sh: #1240: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser46 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:06 UTC 2017
ssl.sh: #1241: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser47 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:07 UTC 2017
ssl.sh: #1242: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser48 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:08 UTC 2017
ssl.sh: #1243: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser49 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:08 UTC 2017
ssl.sh: #1244: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser50 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:09 UTC 2017
ssl.sh: #1245: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser51 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:10 UTC 2017
ssl.sh: #1246: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser52 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:11 UTC 2017
ssl.sh: #1247: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_43-48
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:11 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1248: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser40 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:12 UTC 2017
ssl.sh: #1249: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:13 UTC 2017
ssl.sh: #1250: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser42 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:13 UTC 2017
ssl.sh: #1251: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser43 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:14 UTC 2017
ssl.sh: #1252: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser44 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:15 UTC 2017
ssl.sh: #1253: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser45 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:16 UTC 2017
ssl.sh: #1254: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser46 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:17 UTC 2017
ssl.sh: #1255: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser47 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:17 UTC 2017
ssl.sh: #1256: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser48 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:18 UTC 2017
ssl.sh: #1257: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser49 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:19 UTC 2017
ssl.sh: #1258: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser50 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:19 UTC 2017
ssl.sh: #1259: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser51 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:20 UTC 2017
ssl.sh: #1260: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser52 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:21 UTC 2017
ssl.sh: #1261: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_49-52
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:22 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1262: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser40 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:23 UTC 2017
ssl.sh: #1263: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:23 UTC 2017
ssl.sh: #1264: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser42 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:24 UTC 2017
ssl.sh: #1265: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser43 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:25 UTC 2017
ssl.sh: #1266: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser44 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:25 UTC 2017
ssl.sh: #1267: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser45 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:26 UTC 2017
ssl.sh: #1268: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser46 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:27 UTC 2017
ssl.sh: #1269: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser47 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:28 UTC 2017
ssl.sh: #1270: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser48 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:28 UTC 2017
ssl.sh: #1271: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser49 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:29 UTC 2017
ssl.sh: #1272: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser50 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:30 UTC 2017
ssl.sh: #1273: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser51 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:31 UTC 2017
ssl.sh: #1274: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser52 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 29059 >/dev/null 2>/dev/null
selfserv with PID 29059 found at Wed May 31 23:18:32 UTC 2017
ssl.sh: #1275: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 29059 at Wed May 31 23:18:32 UTC 2017
kill -USR1 29059
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29059 killed at Wed May 31 23:18:32 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:18:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:18:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:18:32 UTC 2017
selfserv with PID 30788 started at Wed May 31 23:18:32 UTC 2017
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:18:33 UTC 2017
ssl.sh: #1276: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:18:34 UTC 2017
ssl.sh: #1277: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:18:35 UTC 2017
ssl.sh: #1278: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser43 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:18:36 UTC 2017
ssl.sh: #1279: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser44 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:18:37 UTC 2017
ssl.sh: #1280: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser45 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:18:38 UTC 2017
ssl.sh: #1281: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser46 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:18:39 UTC 2017
ssl.sh: #1282: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser47 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:18:40 UTC 2017
ssl.sh: #1283: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser48 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:18:40 UTC 2017
ssl.sh: #1284: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser49 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:18:41 UTC 2017
ssl.sh: #1285: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser50 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:18:42 UTC 2017
ssl.sh: #1286: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser51 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:18:43 UTC 2017
ssl.sh: #1287: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser52 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:18:44 UTC 2017
ssl.sh: #1288: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_43-48
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:18:45 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1289: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:18:46 UTC 2017
ssl.sh: #1290: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:18:47 UTC 2017
ssl.sh: #1291: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:18:48 UTC 2017
ssl.sh: #1292: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser43 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:18:49 UTC 2017
ssl.sh: #1293: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser44 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:18:49 UTC 2017
ssl.sh: #1294: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser45 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:18:50 UTC 2017
ssl.sh: #1295: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser46 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:18:51 UTC 2017
ssl.sh: #1296: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser47 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:18:52 UTC 2017
ssl.sh: #1297: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser48 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:18:53 UTC 2017
ssl.sh: #1298: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser49 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:18:54 UTC 2017
ssl.sh: #1299: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser50 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:18:55 UTC 2017
ssl.sh: #1300: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser51 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:18:56 UTC 2017
ssl.sh: #1301: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser52 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:18:57 UTC 2017
ssl.sh: #1302: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_49-52
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:18:58 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1303: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:18:59 UTC 2017
ssl.sh: #1304: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:19:00 UTC 2017
ssl.sh: #1305: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:19:00 UTC 2017
ssl.sh: #1306: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser43 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:19:01 UTC 2017
ssl.sh: #1307: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser44 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:19:02 UTC 2017
ssl.sh: #1308: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser45 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:19:03 UTC 2017
ssl.sh: #1309: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser46 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:19:04 UTC 2017
ssl.sh: #1310: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser47 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:19:05 UTC 2017
ssl.sh: #1311: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser48 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:19:06 UTC 2017
ssl.sh: #1312: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser49 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:19:06 UTC 2017
ssl.sh: #1313: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser50 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:19:07 UTC 2017
ssl.sh: #1314: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser51 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:19:08 UTC 2017
ssl.sh: #1315: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser52 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:19:09 UTC 2017
ssl.sh: #1316: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 30788 at Wed May 31 23:19:09 UTC 2017
kill -USR1 30788
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30788 killed at Wed May 31 23:19:09 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:19:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:19:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:10 UTC 2017
selfserv with PID 32210 started at Wed May 31 23:19:10 UTC 2017
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:11 UTC 2017
ssl.sh: #1317: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:11 UTC 2017
ssl.sh: #1318: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:12 UTC 2017
ssl.sh: #1319: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser43 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:13 UTC 2017
ssl.sh: #1320: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser44 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:13 UTC 2017
ssl.sh: #1321: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser45 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:14 UTC 2017
ssl.sh: #1322: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser46 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:15 UTC 2017
ssl.sh: #1323: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser47 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:15 UTC 2017
ssl.sh: #1324: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser48 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:16 UTC 2017
ssl.sh: #1325: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser49 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:17 UTC 2017
ssl.sh: #1326: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser50 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:17 UTC 2017
ssl.sh: #1327: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser51 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:18 UTC 2017
ssl.sh: #1328: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser52 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:19 UTC 2017
ssl.sh: #1329: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_43-48
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:20 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1330: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:20 UTC 2017
ssl.sh: #1331: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:21 UTC 2017
ssl.sh: #1332: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:22 UTC 2017
ssl.sh: #1333: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser43 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:23 UTC 2017
ssl.sh: #1334: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser44 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:23 UTC 2017
ssl.sh: #1335: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser45 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:24 UTC 2017
ssl.sh: #1336: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser46 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:25 UTC 2017
ssl.sh: #1337: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser47 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:25 UTC 2017
ssl.sh: #1338: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser48 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:26 UTC 2017
ssl.sh: #1339: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser49 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:27 UTC 2017
ssl.sh: #1340: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser50 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:27 UTC 2017
ssl.sh: #1341: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser51 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:28 UTC 2017
ssl.sh: #1342: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser52 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:29 UTC 2017
ssl.sh: #1343: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_49-52
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:30 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1344: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:30 UTC 2017
ssl.sh: #1345: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:31 UTC 2017
ssl.sh: #1346: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:31 UTC 2017
ssl.sh: #1347: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser43 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:32 UTC 2017
ssl.sh: #1348: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser44 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:33 UTC 2017
ssl.sh: #1349: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser45 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:34 UTC 2017
ssl.sh: #1350: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser46 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:34 UTC 2017
ssl.sh: #1351: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser47 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:35 UTC 2017
ssl.sh: #1352: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser48 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:36 UTC 2017
ssl.sh: #1353: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser49 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:36 UTC 2017
ssl.sh: #1354: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser50 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:37 UTC 2017
ssl.sh: #1355: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser51 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:38 UTC 2017
ssl.sh: #1356: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser52 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 32210 >/dev/null 2>/dev/null
selfserv with PID 32210 found at Wed May 31 23:19:38 UTC 2017
ssl.sh: #1357: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32210 at Wed May 31 23:19:38 UTC 2017
kill -USR1 32210
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32210 killed at Wed May 31 23:19:39 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:19:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:19:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:19:39 UTC 2017
selfserv with PID 1181 started at Wed May 31 23:19:39 UTC 2017
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser40-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:19:40 UTC 2017
ssl.sh: #1358: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:19:41 UTC 2017
ssl.sh: #1359: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser42-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:19:42 UTC 2017
ssl.sh: #1360: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser43-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:19:42 UTC 2017
ssl.sh: #1361: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser44-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:19:43 UTC 2017
ssl.sh: #1362: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser45-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:19:44 UTC 2017
ssl.sh: #1363: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser46-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:19:45 UTC 2017
ssl.sh: #1364: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser47-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:19:46 UTC 2017
ssl.sh: #1365: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser48-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:19:47 UTC 2017
ssl.sh: #1366: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser49-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:19:47 UTC 2017
ssl.sh: #1367: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser50-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:19:48 UTC 2017
ssl.sh: #1368: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser51-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:19:49 UTC 2017
ssl.sh: #1369: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser52-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:19:50 UTC 2017
ssl.sh: #1370: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_43-48-ec
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 102 bytes
tstclnt: Writing 102 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:19:51 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1371: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser40-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:19:52 UTC 2017
ssl.sh: #1372: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:19:52 UTC 2017
ssl.sh: #1373: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser42-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:19:53 UTC 2017
ssl.sh: #1374: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser43-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:19:54 UTC 2017
ssl.sh: #1375: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser44-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:19:55 UTC 2017
ssl.sh: #1376: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser45-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:19:56 UTC 2017
ssl.sh: #1377: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser46-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:19:56 UTC 2017
ssl.sh: #1378: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser47-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:19:57 UTC 2017
ssl.sh: #1379: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser48-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:19:58 UTC 2017
ssl.sh: #1380: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser49-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:19:59 UTC 2017
ssl.sh: #1381: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser50-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:20:00 UTC 2017
ssl.sh: #1382: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser51-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:20:00 UTC 2017
ssl.sh: #1383: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser52-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:20:01 UTC 2017
ssl.sh: #1384: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_49-52-ec
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 102 bytes
tstclnt: Writing 102 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:20:02 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1385: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser40-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:20:03 UTC 2017
ssl.sh: #1386: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:20:04 UTC 2017
ssl.sh: #1387: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser42-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:20:05 UTC 2017
ssl.sh: #1388: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser43-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:20:05 UTC 2017
ssl.sh: #1389: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser44-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:20:06 UTC 2017
ssl.sh: #1390: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser45-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:20:07 UTC 2017
ssl.sh: #1391: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser46-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:20:08 UTC 2017
ssl.sh: #1392: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser47-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:20:09 UTC 2017
ssl.sh: #1393: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser48-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:20:10 UTC 2017
ssl.sh: #1394: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser49-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:20:11 UTC 2017
ssl.sh: #1395: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser50-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:20:12 UTC 2017
ssl.sh: #1396: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser51-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:20:12 UTC 2017
ssl.sh: #1397: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser52-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 1181 >/dev/null 2>/dev/null
selfserv with PID 1181 found at Wed May 31 23:20:13 UTC 2017
ssl.sh: #1398: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1181 at Wed May 31 23:20:13 UTC 2017
kill -USR1 1181
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1181 killed at Wed May 31 23:20:14 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:20:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:20:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:14 UTC 2017
selfserv with PID 2936 started at Wed May 31 23:20:14 UTC 2017
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:15 UTC 2017
ssl.sh: #1399: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:17 UTC 2017
ssl.sh: #1400: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:17 UTC 2017
ssl.sh: #1401: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser43-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:18 UTC 2017
ssl.sh: #1402: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser44-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:19 UTC 2017
ssl.sh: #1403: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser45-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:21 UTC 2017
ssl.sh: #1404: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser46-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:22 UTC 2017
ssl.sh: #1405: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser47-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:23 UTC 2017
ssl.sh: #1406: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser48-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:24 UTC 2017
ssl.sh: #1407: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser49-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:25 UTC 2017
ssl.sh: #1408: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser50-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:26 UTC 2017
ssl.sh: #1409: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser51-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:27 UTC 2017
ssl.sh: #1410: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser52-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:28 UTC 2017
ssl.sh: #1411: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_43-48-ec
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 102 bytes
tstclnt: Writing 102 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:29 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1412: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:30 UTC 2017
ssl.sh: #1413: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:31 UTC 2017
ssl.sh: #1414: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:32 UTC 2017
ssl.sh: #1415: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser43-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:33 UTC 2017
ssl.sh: #1416: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser44-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:34 UTC 2017
ssl.sh: #1417: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser45-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:34 UTC 2017
ssl.sh: #1418: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser46-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:36 UTC 2017
ssl.sh: #1419: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser47-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:37 UTC 2017
ssl.sh: #1420: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser48-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:37 UTC 2017
ssl.sh: #1421: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser49-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:39 UTC 2017
ssl.sh: #1422: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser50-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:40 UTC 2017
ssl.sh: #1423: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser51-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:41 UTC 2017
ssl.sh: #1424: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser52-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:42 UTC 2017
ssl.sh: #1425: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_49-52-ec
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 102 bytes
tstclnt: Writing 102 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:43 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1426: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:43 UTC 2017
ssl.sh: #1427: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:44 UTC 2017
ssl.sh: #1428: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:45 UTC 2017
ssl.sh: #1429: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser43-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:46 UTC 2017
ssl.sh: #1430: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser44-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:47 UTC 2017
ssl.sh: #1431: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser45-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:48 UTC 2017
ssl.sh: #1432: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser46-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:49 UTC 2017
ssl.sh: #1433: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser47-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:50 UTC 2017
ssl.sh: #1434: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser48-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:51 UTC 2017
ssl.sh: #1435: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser49-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:52 UTC 2017
ssl.sh: #1436: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser50-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:53 UTC 2017
ssl.sh: #1437: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser51-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:54 UTC 2017
ssl.sh: #1438: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser52-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 2936 >/dev/null 2>/dev/null
selfserv with PID 2936 found at Wed May 31 23:20:55 UTC 2017
ssl.sh: #1439: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2936 at Wed May 31 23:20:55 UTC 2017
kill -USR1 2936
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2936 killed at Wed May 31 23:20:55 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:20:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:20:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:20:55 UTC 2017
selfserv with PID 4453 started at Wed May 31 23:20:55 UTC 2017
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:20:56 UTC 2017
ssl.sh: #1440: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:20:57 UTC 2017
ssl.sh: #1441: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:20:58 UTC 2017
ssl.sh: #1442: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser43-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:20:59 UTC 2017
ssl.sh: #1443: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser44-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:20:59 UTC 2017
ssl.sh: #1444: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser45-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:00 UTC 2017
ssl.sh: #1445: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser46-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:01 UTC 2017
ssl.sh: #1446: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser47-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:02 UTC 2017
ssl.sh: #1447: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser48-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:02 UTC 2017
ssl.sh: #1448: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser49-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:03 UTC 2017
ssl.sh: #1449: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser50-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:04 UTC 2017
ssl.sh: #1450: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser51-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:05 UTC 2017
ssl.sh: #1451: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser52-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:06 UTC 2017
ssl.sh: #1452: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_43-48-ec
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 102 bytes
tstclnt: Writing 102 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:06 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1453: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:07 UTC 2017
ssl.sh: #1454: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:08 UTC 2017
ssl.sh: #1455: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:09 UTC 2017
ssl.sh: #1456: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser43-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:09 UTC 2017
ssl.sh: #1457: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser44-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:10 UTC 2017
ssl.sh: #1458: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser45-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:11 UTC 2017
ssl.sh: #1459: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser46-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:12 UTC 2017
ssl.sh: #1460: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser47-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:12 UTC 2017
ssl.sh: #1461: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser48-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:13 UTC 2017
ssl.sh: #1462: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser49-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:14 UTC 2017
ssl.sh: #1463: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser50-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:15 UTC 2017
ssl.sh: #1464: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser51-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:15 UTC 2017
ssl.sh: #1465: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser52-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:16 UTC 2017
ssl.sh: #1466: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_49-52-ec
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 102 bytes
tstclnt: Writing 102 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:17 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1467: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:18 UTC 2017
ssl.sh: #1468: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:18 UTC 2017
ssl.sh: #1469: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:19 UTC 2017
ssl.sh: #1470: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser43-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:20 UTC 2017
ssl.sh: #1471: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser44-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:20 UTC 2017
ssl.sh: #1472: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser45-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:21 UTC 2017
ssl.sh: #1473: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser46-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:22 UTC 2017
ssl.sh: #1474: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser47-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:23 UTC 2017
ssl.sh: #1475: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser48-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:23 UTC 2017
ssl.sh: #1476: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser49-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:24 UTC 2017
ssl.sh: #1477: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser50-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:25 UTC 2017
ssl.sh: #1478: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser51-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:26 UTC 2017
ssl.sh: #1479: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser52-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 4453 >/dev/null 2>/dev/null
selfserv with PID 4453 found at Wed May 31 23:21:26 UTC 2017
ssl.sh: #1480: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 4453 at Wed May 31 23:21:26 UTC 2017
kill -USR1 4453
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4453 killed at Wed May 31 23:21:26 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:21:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:21:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5884 >/dev/null 2>/dev/null
selfserv with PID 5884 found at Wed May 31 23:21:27 UTC 2017
selfserv with PID 5884 started at Wed May 31 23:21:27 UTC 2017
trying to kill selfserv with PID 5884 at Wed May 31 23:21:27 UTC 2017
kill -USR1 5884
./ssl.sh: line 182: 5884 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss ${sparam} -i ${R_SERVERPID} -V ssl3:tls1.2 $verbose -H 1
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5884 killed at Wed May 31 23:21:27 UTC 2017
selfserv starting at Wed May 31 23:21:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:21:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:27 UTC 2017
selfserv with PID 5926 started at Wed May 31 23:21:27 UTC 2017
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser40 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:28 UTC 2017
ssl.sh: #1481: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:29 UTC 2017
ssl.sh: #1482: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser42 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:29 UTC 2017
ssl.sh: #1483: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser43 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:30 UTC 2017
ssl.sh: #1484: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser44 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:31 UTC 2017
ssl.sh: #1485: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser45 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:32 UTC 2017
ssl.sh: #1486: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser46 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:32 UTC 2017
ssl.sh: #1487: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser47 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:33 UTC 2017
ssl.sh: #1488: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser48 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:34 UTC 2017
ssl.sh: #1489: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser49 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:34 UTC 2017
ssl.sh: #1490: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser50 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:35 UTC 2017
ssl.sh: #1491: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser51 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:36 UTC 2017
ssl.sh: #1492: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser52 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:37 UTC 2017
ssl.sh: #1493: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_43-48
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:37 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1494: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser40 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:38 UTC 2017
ssl.sh: #1495: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:39 UTC 2017
ssl.sh: #1496: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser42 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:40 UTC 2017
ssl.sh: #1497: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser43 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:40 UTC 2017
ssl.sh: #1498: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser44 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:41 UTC 2017
ssl.sh: #1499: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser45 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:42 UTC 2017
ssl.sh: #1500: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser46 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:43 UTC 2017
ssl.sh: #1501: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser47 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:43 UTC 2017
ssl.sh: #1502: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser48 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:44 UTC 2017
ssl.sh: #1503: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser49 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:45 UTC 2017
ssl.sh: #1504: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser50 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:46 UTC 2017
ssl.sh: #1505: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser51 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:46 UTC 2017
ssl.sh: #1506: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser52 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:47 UTC 2017
ssl.sh: #1507: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_49-52
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:48 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1508: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser40 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:49 UTC 2017
ssl.sh: #1509: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:49 UTC 2017
ssl.sh: #1510: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser42 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:50 UTC 2017
ssl.sh: #1511: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser43 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:51 UTC 2017
ssl.sh: #1512: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser44 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:51 UTC 2017
ssl.sh: #1513: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser45 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:52 UTC 2017
ssl.sh: #1514: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser46 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:53 UTC 2017
ssl.sh: #1515: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser47 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:54 UTC 2017
ssl.sh: #1516: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser48 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:54 UTC 2017
ssl.sh: #1517: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser49 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:55 UTC 2017
ssl.sh: #1518: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser50 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:56 UTC 2017
ssl.sh: #1519: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser51 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:57 UTC 2017
ssl.sh: #1520: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser52 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 5926 >/dev/null 2>/dev/null
selfserv with PID 5926 found at Wed May 31 23:21:58 UTC 2017
ssl.sh: #1521: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 5926 at Wed May 31 23:21:58 UTC 2017
kill -USR1 5926
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5926 killed at Wed May 31 23:21:58 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:21:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:21:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:21:58 UTC 2017
selfserv with PID 7349 started at Wed May 31 23:21:58 UTC 2017
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:21:59 UTC 2017
ssl.sh: #1522: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:00 UTC 2017
ssl.sh: #1523: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:01 UTC 2017
ssl.sh: #1524: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser43 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:02 UTC 2017
ssl.sh: #1525: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser44 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:03 UTC 2017
ssl.sh: #1526: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser45 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:04 UTC 2017
ssl.sh: #1527: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser46 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:05 UTC 2017
ssl.sh: #1528: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser47 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:06 UTC 2017
ssl.sh: #1529: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser48 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:07 UTC 2017
ssl.sh: #1530: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser49 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:08 UTC 2017
ssl.sh: #1531: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser50 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:08 UTC 2017
ssl.sh: #1532: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser51 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:09 UTC 2017
ssl.sh: #1533: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser52 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:10 UTC 2017
ssl.sh: #1534: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_43-48
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:11 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1535: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:12 UTC 2017
ssl.sh: #1536: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:13 UTC 2017
ssl.sh: #1537: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:14 UTC 2017
ssl.sh: #1538: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser43 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:15 UTC 2017
ssl.sh: #1539: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser44 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:15 UTC 2017
ssl.sh: #1540: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser45 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:16 UTC 2017
ssl.sh: #1541: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser46 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:17 UTC 2017
ssl.sh: #1542: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser47 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:18 UTC 2017
ssl.sh: #1543: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser48 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:19 UTC 2017
ssl.sh: #1544: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser49 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:20 UTC 2017
ssl.sh: #1545: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser50 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:21 UTC 2017
ssl.sh: #1546: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser51 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:22 UTC 2017
ssl.sh: #1547: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser52 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:23 UTC 2017
ssl.sh: #1548: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_49-52
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:24 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1549: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:24 UTC 2017
ssl.sh: #1550: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:25 UTC 2017
ssl.sh: #1551: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:26 UTC 2017
ssl.sh: #1552: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser43 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:27 UTC 2017
ssl.sh: #1553: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser44 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:28 UTC 2017
ssl.sh: #1554: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser45 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:29 UTC 2017
ssl.sh: #1555: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser46 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:30 UTC 2017
ssl.sh: #1556: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser47 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:31 UTC 2017
ssl.sh: #1557: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser48 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:32 UTC 2017
ssl.sh: #1558: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser49 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:32 UTC 2017
ssl.sh: #1559: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser50 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:33 UTC 2017
ssl.sh: #1560: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser51 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:34 UTC 2017
ssl.sh: #1561: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser52 < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 7349 >/dev/null 2>/dev/null
selfserv with PID 7349 found at Wed May 31 23:22:35 UTC 2017
ssl.sh: #1562: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 7349 at Wed May 31 23:22:35 UTC 2017
kill -USR1 7349
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7349 killed at Wed May 31 23:22:35 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:22:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:22:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:36 UTC 2017
selfserv with PID 8774 started at Wed May 31 23:22:36 UTC 2017
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:37 UTC 2017
ssl.sh: #1563: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:37 UTC 2017
ssl.sh: #1564: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:38 UTC 2017
ssl.sh: #1565: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser43 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:39 UTC 2017
ssl.sh: #1566: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser44 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:39 UTC 2017
ssl.sh: #1567: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser45 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:40 UTC 2017
ssl.sh: #1568: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser46 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:41 UTC 2017
ssl.sh: #1569: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser47 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:41 UTC 2017
ssl.sh: #1570: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser48 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:42 UTC 2017
ssl.sh: #1571: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser49 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:43 UTC 2017
ssl.sh: #1572: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser50 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:44 UTC 2017
ssl.sh: #1573: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser51 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:44 UTC 2017
ssl.sh: #1574: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser52 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:45 UTC 2017
ssl.sh: #1575: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_43-48
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:46 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1576: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:46 UTC 2017
ssl.sh: #1577: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:47 UTC 2017
ssl.sh: #1578: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:48 UTC 2017
ssl.sh: #1579: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser43 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:48 UTC 2017
ssl.sh: #1580: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser44 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:49 UTC 2017
ssl.sh: #1581: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser45 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:50 UTC 2017
ssl.sh: #1582: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser46 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:50 UTC 2017
ssl.sh: #1583: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser47 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:51 UTC 2017
ssl.sh: #1584: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser48 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:52 UTC 2017
ssl.sh: #1585: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser49 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:52 UTC 2017
ssl.sh: #1586: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser50 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:53 UTC 2017
ssl.sh: #1587: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser51 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:54 UTC 2017
ssl.sh: #1588: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser52 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:55 UTC 2017
ssl.sh: #1589: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_49-52
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 99 bytes
tstclnt: Writing 99 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:55 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1590: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:56 UTC 2017
ssl.sh: #1591: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:57 UTC 2017
ssl.sh: #1592: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:57 UTC 2017
ssl.sh: #1593: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser43 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:58 UTC 2017
ssl.sh: #1594: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser44 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:59 UTC 2017
ssl.sh: #1595: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser45 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:22:59 UTC 2017
ssl.sh: #1596: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser46 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:23:00 UTC 2017
ssl.sh: #1597: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser47 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:23:01 UTC 2017
ssl.sh: #1598: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser48 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:23:01 UTC 2017
ssl.sh: #1599: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser49 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:23:02 UTC 2017
ssl.sh: #1600: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser50 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:23:03 UTC 2017
ssl.sh: #1601: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser51 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:23:04 UTC 2017
ssl.sh: #1602: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser52 -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 8774 >/dev/null 2>/dev/null
selfserv with PID 8774 found at Wed May 31 23:23:04 UTC 2017
ssl.sh: #1603: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 8774 at Wed May 31 23:23:05 UTC 2017
kill -USR1 8774
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8774 killed at Wed May 31 23:23:05 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:23:05 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:23:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:05 UTC 2017
selfserv with PID 10409 started at Wed May 31 23:23:05 UTC 2017
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser40-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:06 UTC 2017
ssl.sh: #1604: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:07 UTC 2017
ssl.sh: #1605: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser42-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:08 UTC 2017
ssl.sh: #1606: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser43-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:09 UTC 2017
ssl.sh: #1607: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser44-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:09 UTC 2017
ssl.sh: #1608: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser45-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:10 UTC 2017
ssl.sh: #1609: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser46-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:11 UTC 2017
ssl.sh: #1610: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser47-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:12 UTC 2017
ssl.sh: #1611: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser48-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:13 UTC 2017
ssl.sh: #1612: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser49-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:14 UTC 2017
ssl.sh: #1613: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser50-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:15 UTC 2017
ssl.sh: #1614: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser51-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:15 UTC 2017
ssl.sh: #1615: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser52-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:16 UTC 2017
ssl.sh: #1616: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_43-48-ec
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 102 bytes
tstclnt: Writing 102 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:17 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1617: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser40-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:18 UTC 2017
ssl.sh: #1618: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:19 UTC 2017
ssl.sh: #1619: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser42-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:19 UTC 2017
ssl.sh: #1620: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser43-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:20 UTC 2017
ssl.sh: #1621: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser44-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:21 UTC 2017
ssl.sh: #1622: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser45-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:22 UTC 2017
ssl.sh: #1623: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser46-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:23 UTC 2017
ssl.sh: #1624: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser47-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:23 UTC 2017
ssl.sh: #1625: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser48-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:24 UTC 2017
ssl.sh: #1626: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser49-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:25 UTC 2017
ssl.sh: #1627: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser50-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:26 UTC 2017
ssl.sh: #1628: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser51-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:27 UTC 2017
ssl.sh: #1629: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser52-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:28 UTC 2017
ssl.sh: #1630: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_49-52-ec
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 102 bytes
tstclnt: Writing 102 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:29 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1631: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser40-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:29 UTC 2017
ssl.sh: #1632: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:30 UTC 2017
ssl.sh: #1633: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser42-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:31 UTC 2017
ssl.sh: #1634: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser43-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:32 UTC 2017
ssl.sh: #1635: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser44-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:32 UTC 2017
ssl.sh: #1636: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser45-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:33 UTC 2017
ssl.sh: #1637: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser46-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:34 UTC 2017
ssl.sh: #1638: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser47-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:35 UTC 2017
ssl.sh: #1639: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser48-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:36 UTC 2017
ssl.sh: #1640: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser49-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:36 UTC 2017
ssl.sh: #1641: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser50-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:37 UTC 2017
ssl.sh: #1642: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser51-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:38 UTC 2017
ssl.sh: #1643: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser52-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 10409 >/dev/null 2>/dev/null
selfserv with PID 10409 found at Wed May 31 23:23:39 UTC 2017
ssl.sh: #1644: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10409 at Wed May 31 23:23:39 UTC 2017
kill -USR1 10409
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10409 killed at Wed May 31 23:23:39 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:23:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:23:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:23:39 UTC 2017
selfserv with PID 11935 started at Wed May 31 23:23:39 UTC 2017
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:23:41 UTC 2017
ssl.sh: #1645: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:23:42 UTC 2017
ssl.sh: #1646: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:23:42 UTC 2017
ssl.sh: #1647: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser43-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:23:43 UTC 2017
ssl.sh: #1648: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser44-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:23:44 UTC 2017
ssl.sh: #1649: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser45-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:23:46 UTC 2017
ssl.sh: #1650: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser46-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:23:47 UTC 2017
ssl.sh: #1651: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser47-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:23:48 UTC 2017
ssl.sh: #1652: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser48-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:23:49 UTC 2017
ssl.sh: #1653: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser49-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:23:50 UTC 2017
ssl.sh: #1654: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser50-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:23:51 UTC 2017
ssl.sh: #1655: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser51-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:23:52 UTC 2017
ssl.sh: #1656: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser52-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:23:53 UTC 2017
ssl.sh: #1657: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_43-48-ec
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 102 bytes
tstclnt: Writing 102 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:23:54 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1658: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:23:55 UTC 2017
ssl.sh: #1659: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:23:56 UTC 2017
ssl.sh: #1660: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:23:57 UTC 2017
ssl.sh: #1661: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser43-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:23:58 UTC 2017
ssl.sh: #1662: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser44-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:23:58 UTC 2017
ssl.sh: #1663: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser45-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:23:59 UTC 2017
ssl.sh: #1664: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser46-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:24:00 UTC 2017
ssl.sh: #1665: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser47-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:24:01 UTC 2017
ssl.sh: #1666: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser48-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:24:02 UTC 2017
ssl.sh: #1667: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser49-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:24:03 UTC 2017
ssl.sh: #1668: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser50-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:24:04 UTC 2017
ssl.sh: #1669: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser51-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:24:05 UTC 2017
ssl.sh: #1670: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser52-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:24:06 UTC 2017
ssl.sh: #1671: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_49-52-ec
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 102 bytes
tstclnt: Writing 102 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:24:07 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1672: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser40-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:24:08 UTC 2017
ssl.sh: #1673: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser41-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:24:09 UTC 2017
ssl.sh: #1674: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser42-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:24:10 UTC 2017
ssl.sh: #1675: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser43-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:24:11 UTC 2017
ssl.sh: #1676: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser44-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:24:12 UTC 2017
ssl.sh: #1677: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser45-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:24:13 UTC 2017
ssl.sh: #1678: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser46-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:24:14 UTC 2017
ssl.sh: #1679: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser47-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:24:15 UTC 2017
ssl.sh: #1680: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser48-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:24:15 UTC 2017
ssl.sh: #1681: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser49-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:24:16 UTC 2017
ssl.sh: #1682: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser50-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:24:17 UTC 2017
ssl.sh: #1683: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser51-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:24:18 UTC 2017
ssl.sh: #1684: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser52-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 11935 >/dev/null 2>/dev/null
selfserv with PID 11935 found at Wed May 31 23:24:19 UTC 2017
ssl.sh: #1685: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11935 at Wed May 31 23:24:19 UTC 2017
kill -USR1 11935
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11935 killed at Wed May 31 23:24:20 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:24:20 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:24:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:20 UTC 2017
selfserv with PID 13359 started at Wed May 31 23:24:20 UTC 2017
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:21 UTC 2017
ssl.sh: #1686: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:22 UTC 2017
ssl.sh: #1687: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:22 UTC 2017
ssl.sh: #1688: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser43-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:23 UTC 2017
ssl.sh: #1689: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser44-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:24 UTC 2017
ssl.sh: #1690: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser45-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:25 UTC 2017
ssl.sh: #1691: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser46-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:26 UTC 2017
ssl.sh: #1692: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser47-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:26 UTC 2017
ssl.sh: #1693: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser48-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:27 UTC 2017
ssl.sh: #1694: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser49-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:28 UTC 2017
ssl.sh: #1695: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser50-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:29 UTC 2017
ssl.sh: #1696: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser51-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:30 UTC 2017
ssl.sh: #1697: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser52-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:31 UTC 2017
ssl.sh: #1698: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 43 - 48 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_43-48-ec
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 102 bytes
tstclnt: Writing 102 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:31 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1699: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:32 UTC 2017
ssl.sh: #1700: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:33 UTC 2017
ssl.sh: #1701: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:34 UTC 2017
ssl.sh: #1702: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser43-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:34 UTC 2017
ssl.sh: #1703: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser44-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:35 UTC 2017
ssl.sh: #1704: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser45-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:36 UTC 2017
ssl.sh: #1705: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser46-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:36 UTC 2017
ssl.sh: #1706: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser47-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:37 UTC 2017
ssl.sh: #1707: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser48-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:38 UTC 2017
ssl.sh: #1708: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser49-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:39 UTC 2017
ssl.sh: #1709: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser50-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:39 UTC 2017
ssl.sh: #1710: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser51-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:40 UTC 2017
ssl.sh: #1711: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser52-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:41 UTC 2017
ssl.sh: #1712: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED
================= Reloading ECC CRL for group 49 - 52 =============
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser41-ec
Request:
GET crl:///<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server/root.crl_49-52-ec
RELOAD time
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 102 bytes
tstclnt: Writing 102 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:42 UTC 2017
================= CRL Reloaded =============
ssl.sh: #1713: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser40-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:43 UTC 2017
ssl.sh: #1714: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser41-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:43 UTC 2017
ssl.sh: #1715: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser42-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:44 UTC 2017
ssl.sh: #1716: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser43-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: PR_Poll returned 0x29 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:45 UTC 2017
ssl.sh: #1717: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser44-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:45 UTC 2017
ssl.sh: #1718: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser45-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:46 UTC 2017
ssl.sh: #1719: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser46-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:47 UTC 2017
ssl.sh: #1720: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser47-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:48 UTC 2017
ssl.sh: #1721: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser48-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:48 UTC 2017
ssl.sh: #1722: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser49-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:49 UTC 2017
ssl.sh: #1723: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser50-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:50 UTC 2017
ssl.sh: #1724: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser51-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:51 UTC 2017
ssl.sh: #1725: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED
Server Args: -r_-r_-r_-r
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser52-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -8180:
Peer's Certificate has been revoked.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked.
tstclnt: exiting with return code 1
kill -0 13359 >/dev/null 2>/dev/null
selfserv with PID 13359 found at Wed May 31 23:24:51 UTC 2017
ssl.sh: #1726: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13359 at Wed May 31 23:24:51 UTC 2017
kill -USR1 13359
selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13359 killed at Wed May 31 23:24:51 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:24:51 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:24:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14782 >/dev/null 2>/dev/null
selfserv with PID 14782 found at Wed May 31 23:24:52 UTC 2017
selfserv with PID 14782 started at Wed May 31 23:24:52 UTC 2017
trying to kill selfserv with PID 14782 at Wed May 31 23:24:52 UTC 2017
kill -USR1 14782
./ssl.sh: line 182: 14782 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv -D -p ${PORT} -d ${P_R_SERVERDIR} -n ${HOSTADDR} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss ${sparam} -i ${R_SERVERPID} -V ssl3:tls1.2 $verbose -H 1
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14782 killed at Wed May 31 23:24:52 UTC 2017
ssl.sh: SSL Cipher Coverage - server bypass/client normal - with ECC ===============================
selfserv starting at Wed May 31 23:24:52 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:24:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:24:52 UTC 2017
selfserv with PID 14830 started at Wed May 31 23:24:52 UTC 2017
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:24:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:ssl3 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1727: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:24:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:ssl3 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1728: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:24:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:ssl3 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1729: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:24:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:ssl3 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1730: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:24:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:ssl3 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1731: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:24:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:ssl3 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1732: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:24:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:ssl3 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1733: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:24:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:ssl3 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1734: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:24:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:ssl3 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1735: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:24:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:ssl3 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1736: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:24:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:ssl3 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1737: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:24:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:ssl3 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1738: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:24:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:ssl3 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1739: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:24:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:ssl3 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1740: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:24:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009F -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1741: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:24:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A3 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1742: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:24:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009D -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1743: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:24:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1744: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:24:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1745: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:24:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1746: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:24:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1747: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:24:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1748: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:24:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1749: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:24:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1750: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:24:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1751: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:24:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1752: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:24:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1753: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1754: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1755: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1756: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1757: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1758: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1759: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1760: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1761: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1762: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1763: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1764: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1765: TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1766: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1767: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1768: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1769: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1770: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1771: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1772: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1773: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1774: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1775: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1776: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1777: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1778: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1779: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0016 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1780: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0032 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1781: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0033 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1782: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0038 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1783: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0039 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1784: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003B -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1785: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003C -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1786: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003D -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1787: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0040 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1788: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0067 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1789: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006A -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1790: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006B -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1791: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009C -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1792: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009E -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1793: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A2 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1794: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCAA -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1795: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1796: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1797: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1798: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1799: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1800: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1801: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1802: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1803: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1804: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 14830 >/dev/null 2>/dev/null
selfserv with PID 14830 found at Wed May 31 23:25:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1805: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 14830 at Wed May 31 23:25:17 UTC 2017
kill -USR1 14830
selfserv: 0 cache hits; 79 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14830 killed at Wed May 31 23:25:17 UTC 2017
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed May 31 23:25:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:25:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17021 >/dev/null 2>/dev/null
selfserv with PID 17021 found at Wed May 31 23:25:17 UTC 2017
selfserv with PID 17021 started at Wed May 31 23:25:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1806: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 17021 >/dev/null 2>/dev/null
selfserv with PID 17021 found at Wed May 31 23:25:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1807: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17021 >/dev/null 2>/dev/null
selfserv with PID 17021 found at Wed May 31 23:25:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1808: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17021 >/dev/null 2>/dev/null
selfserv with PID 17021 found at Wed May 31 23:25:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1809: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17021 >/dev/null 2>/dev/null
selfserv with PID 17021 found at Wed May 31 23:25:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1810: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 17021 at Wed May 31 23:25:19 UTC 2017
kill -USR1 17021
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17021 killed at Wed May 31 23:25:19 UTC 2017
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed May 31 23:25:19 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:25:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17159 >/dev/null 2>/dev/null
selfserv with PID 17159 found at Wed May 31 23:25:19 UTC 2017
selfserv with PID 17159 started at Wed May 31 23:25:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1811: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 17159 >/dev/null 2>/dev/null
selfserv with PID 17159 found at Wed May 31 23:25:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1812: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17159 >/dev/null 2>/dev/null
selfserv with PID 17159 found at Wed May 31 23:25:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1813: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17159 >/dev/null 2>/dev/null
selfserv with PID 17159 found at Wed May 31 23:25:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1814: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17159 >/dev/null 2>/dev/null
selfserv with PID 17159 found at Wed May 31 23:25:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1815: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 17159 >/dev/null 2>/dev/null
selfserv with PID 17159 found at Wed May 31 23:25:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1816: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 17159 >/dev/null 2>/dev/null
selfserv with PID 17159 found at Wed May 31 23:25:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1817: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17159 >/dev/null 2>/dev/null
selfserv with PID 17159 found at Wed May 31 23:25:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1818: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17159 >/dev/null 2>/dev/null
selfserv with PID 17159 found at Wed May 31 23:25:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1819: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17159 >/dev/null 2>/dev/null
selfserv with PID 17159 found at Wed May 31 23:25:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1820: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 17159 >/dev/null 2>/dev/null
selfserv with PID 17159 found at Wed May 31 23:25:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1821: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 17159 >/dev/null 2>/dev/null
selfserv with PID 17159 found at Wed May 31 23:25:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1822: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17159 >/dev/null 2>/dev/null
selfserv with PID 17159 found at Wed May 31 23:25:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1823: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17159 >/dev/null 2>/dev/null
selfserv with PID 17159 found at Wed May 31 23:25:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1824: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17159 >/dev/null 2>/dev/null
selfserv with PID 17159 found at Wed May 31 23:25:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1825: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 17159 at Wed May 31 23:25:25 UTC 2017
kill -USR1 17159
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17159 killed at Wed May 31 23:25:25 UTC 2017
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed May 31 23:25:25 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:25:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17512 >/dev/null 2>/dev/null
selfserv with PID 17512 found at Wed May 31 23:25:26 UTC 2017
selfserv with PID 17512 started at Wed May 31 23:25:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1826: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 17512 >/dev/null 2>/dev/null
selfserv with PID 17512 found at Wed May 31 23:25:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1827: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17512 >/dev/null 2>/dev/null
selfserv with PID 17512 found at Wed May 31 23:25:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1828: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17512 >/dev/null 2>/dev/null
selfserv with PID 17512 found at Wed May 31 23:25:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1829: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17512 >/dev/null 2>/dev/null
selfserv with PID 17512 found at Wed May 31 23:25:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1830: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 17512 at Wed May 31 23:25:28 UTC 2017
kill -USR1 17512
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17512 killed at Wed May 31 23:25:28 UTC 2017
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed May 31 23:25:28 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:25:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17650 >/dev/null 2>/dev/null
selfserv with PID 17650 found at Wed May 31 23:25:28 UTC 2017
selfserv with PID 17650 started at Wed May 31 23:25:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1831: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 17650 >/dev/null 2>/dev/null
selfserv with PID 17650 found at Wed May 31 23:25:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1832: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17650 >/dev/null 2>/dev/null
selfserv with PID 17650 found at Wed May 31 23:25:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1833: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17650 >/dev/null 2>/dev/null
selfserv with PID 17650 found at Wed May 31 23:25:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1834: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17650 >/dev/null 2>/dev/null
selfserv with PID 17650 found at Wed May 31 23:25:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1835: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 17650 >/dev/null 2>/dev/null
selfserv with PID 17650 found at Wed May 31 23:25:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1836: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 17650 >/dev/null 2>/dev/null
selfserv with PID 17650 found at Wed May 31 23:25:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1837: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17650 >/dev/null 2>/dev/null
selfserv with PID 17650 found at Wed May 31 23:25:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1838: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17650 >/dev/null 2>/dev/null
selfserv with PID 17650 found at Wed May 31 23:25:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1839: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17650 >/dev/null 2>/dev/null
selfserv with PID 17650 found at Wed May 31 23:25:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1840: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 17650 >/dev/null 2>/dev/null
selfserv with PID 17650 found at Wed May 31 23:25:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1841: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 17650 >/dev/null 2>/dev/null
selfserv with PID 17650 found at Wed May 31 23:25:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1842: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17650 >/dev/null 2>/dev/null
selfserv with PID 17650 found at Wed May 31 23:25:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1843: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17650 >/dev/null 2>/dev/null
selfserv with PID 17650 found at Wed May 31 23:25:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1844: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17650 >/dev/null 2>/dev/null
selfserv with PID 17650 found at Wed May 31 23:25:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1845: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 17650 at Wed May 31 23:25:34 UTC 2017
kill -USR1 17650
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17650 killed at Wed May 31 23:25:34 UTC 2017
ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed May 31 23:25:34 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:25:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18003 >/dev/null 2>/dev/null
selfserv with PID 18003 found at Wed May 31 23:25:34 UTC 2017
selfserv with PID 18003 started at Wed May 31 23:25:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1846: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 18003 >/dev/null 2>/dev/null
selfserv with PID 18003 found at Wed May 31 23:25:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1847: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 18003 >/dev/null 2>/dev/null
selfserv with PID 18003 found at Wed May 31 23:25:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1848: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 18003 >/dev/null 2>/dev/null
selfserv with PID 18003 found at Wed May 31 23:25:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1849: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 18003 >/dev/null 2>/dev/null
selfserv with PID 18003 found at Wed May 31 23:25:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1850: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 18003 at Wed May 31 23:25:36 UTC 2017
kill -USR1 18003
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18003 killed at Wed May 31 23:25:36 UTC 2017
ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed May 31 23:25:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:25:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18141 >/dev/null 2>/dev/null
selfserv with PID 18141 found at Wed May 31 23:25:36 UTC 2017
selfserv with PID 18141 started at Wed May 31 23:25:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1851: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 18141 >/dev/null 2>/dev/null
selfserv with PID 18141 found at Wed May 31 23:25:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1852: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 18141 >/dev/null 2>/dev/null
selfserv with PID 18141 found at Wed May 31 23:25:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1853: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 18141 >/dev/null 2>/dev/null
selfserv with PID 18141 found at Wed May 31 23:25:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1854: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 18141 >/dev/null 2>/dev/null
selfserv with PID 18141 found at Wed May 31 23:25:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1855: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 18141 >/dev/null 2>/dev/null
selfserv with PID 18141 found at Wed May 31 23:25:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C023 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1856: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 18141 >/dev/null 2>/dev/null
selfserv with PID 18141 found at Wed May 31 23:25:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C024 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1857: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 18141 >/dev/null 2>/dev/null
selfserv with PID 18141 found at Wed May 31 23:25:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C027 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1858: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 18141 >/dev/null 2>/dev/null
selfserv with PID 18141 found at Wed May 31 23:25:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C028 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1859: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 18141 >/dev/null 2>/dev/null
selfserv with PID 18141 found at Wed May 31 23:25:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02B -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1860: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 18141 >/dev/null 2>/dev/null
selfserv with PID 18141 found at Wed May 31 23:25:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02C -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1861: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 18141 >/dev/null 2>/dev/null
selfserv with PID 18141 found at Wed May 31 23:25:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02F -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1862: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 18141 >/dev/null 2>/dev/null
selfserv with PID 18141 found at Wed May 31 23:25:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C030 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1863: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 18141 >/dev/null 2>/dev/null
selfserv with PID 18141 found at Wed May 31 23:25:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA8 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1864: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 18141 >/dev/null 2>/dev/null
selfserv with PID 18141 found at Wed May 31 23:25:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA9 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1865: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18141 at Wed May 31 23:25:42 UTC 2017
kill -USR1 18141
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18141 killed at Wed May 31 23:25:42 UTC 2017
ssl.sh: SSL Client Authentication - server bypass/client normal - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed May 31 23:25:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:25:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18542 >/dev/null 2>/dev/null
selfserv with PID 18542 found at Wed May 31 23:25:42 UTC 2017
selfserv with PID 18542 started at Wed May 31 23:25:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1866: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18542 at Wed May 31 23:25:43 UTC 2017
kill -USR1 18542
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18542 killed at Wed May 31 23:25:43 UTC 2017
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Wed May 31 23:25:43 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:25:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18599 >/dev/null 2>/dev/null
selfserv with PID 18599 found at Wed May 31 23:25:44 UTC 2017
selfserv with PID 18599 started at Wed May 31 23:25:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1867: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18599 at Wed May 31 23:25:44 UTC 2017
kill -USR1 18599
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18599 killed at Wed May 31 23:25:44 UTC 2017
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Wed May 31 23:25:45 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:25:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18656 >/dev/null 2>/dev/null
selfserv with PID 18656 found at Wed May 31 23:25:45 UTC 2017
selfserv with PID 18656 started at Wed May 31 23:25:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1868: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18656 at Wed May 31 23:25:46 UTC 2017
kill -USR1 18656
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18656 killed at Wed May 31 23:25:46 UTC 2017
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Wed May 31 23:25:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:25:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18713 >/dev/null 2>/dev/null
selfserv with PID 18713 found at Wed May 31 23:25:46 UTC 2017
selfserv with PID 18713 started at Wed May 31 23:25:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1869: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18713 at Wed May 31 23:25:47 UTC 2017
kill -USR1 18713
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18713 killed at Wed May 31 23:25:47 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Wed May 31 23:25:47 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:25:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18770 >/dev/null 2>/dev/null
selfserv with PID 18770 found at Wed May 31 23:25:47 UTC 2017
selfserv with PID 18770 started at Wed May 31 23:25:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1870: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 18770 at Wed May 31 23:25:48 UTC 2017
kill -USR1 18770
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18770 killed at Wed May 31 23:25:48 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed May 31 23:25:48 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:25:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18827 >/dev/null 2>/dev/null
selfserv with PID 18827 found at Wed May 31 23:25:48 UTC 2017
selfserv with PID 18827 started at Wed May 31 23:25:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1871: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18827 at Wed May 31 23:25:49 UTC 2017
kill -USR1 18827
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18827 killed at Wed May 31 23:25:49 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed May 31 23:25:49 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:25:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18884 >/dev/null 2>/dev/null
selfserv with PID 18884 found at Wed May 31 23:25:49 UTC 2017
selfserv with PID 18884 started at Wed May 31 23:25:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1872: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18884 at Wed May 31 23:25:50 UTC 2017
kill -USR1 18884
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18884 killed at Wed May 31 23:25:50 UTC 2017
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Wed May 31 23:25:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:25:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18941 >/dev/null 2>/dev/null
selfserv with PID 18941 found at Wed May 31 23:25:50 UTC 2017
selfserv with PID 18941 started at Wed May 31 23:25:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1873: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18941 at Wed May 31 23:25:51 UTC 2017
kill -USR1 18941
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18941 killed at Wed May 31 23:25:51 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Wed May 31 23:25:51 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:25:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 18998 >/dev/null 2>/dev/null
selfserv with PID 18998 found at Wed May 31 23:25:52 UTC 2017
selfserv with PID 18998 started at Wed May 31 23:25:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1874: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 18998 at Wed May 31 23:25:52 UTC 2017
kill -USR1 18998
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 18998 killed at Wed May 31 23:25:52 UTC 2017
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Wed May 31 23:25:53 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:25:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19055 >/dev/null 2>/dev/null
selfserv with PID 19055 found at Wed May 31 23:25:53 UTC 2017
selfserv with PID 19055 started at Wed May 31 23:25:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1875: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19055 at Wed May 31 23:25:53 UTC 2017
kill -USR1 19055
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19055 killed at Wed May 31 23:25:54 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Wed May 31 23:25:54 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:25:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19112 >/dev/null 2>/dev/null
selfserv with PID 19112 found at Wed May 31 23:25:54 UTC 2017
selfserv with PID 19112 started at Wed May 31 23:25:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1876: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19112 at Wed May 31 23:25:55 UTC 2017
kill -USR1 19112
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19112 killed at Wed May 31 23:25:55 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed May 31 23:25:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:25:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19169 >/dev/null 2>/dev/null
selfserv with PID 19169 found at Wed May 31 23:25:55 UTC 2017
selfserv with PID 19169 started at Wed May 31 23:25:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1877: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19169 at Wed May 31 23:25:56 UTC 2017
kill -USR1 19169
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19169 killed at Wed May 31 23:25:56 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:25:56 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:25:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19226 >/dev/null 2>/dev/null
selfserv with PID 19226 found at Wed May 31 23:25:56 UTC 2017
selfserv with PID 19226 started at Wed May 31 23:25:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1878: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19226 at Wed May 31 23:25:57 UTC 2017
kill -USR1 19226
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19226 killed at Wed May 31 23:25:57 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:25:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:25:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19283 >/dev/null 2>/dev/null
selfserv with PID 19283 found at Wed May 31 23:25:58 UTC 2017
selfserv with PID 19283 started at Wed May 31 23:25:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1879: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19283 at Wed May 31 23:25:59 UTC 2017
kill -USR1 19283
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19283 killed at Wed May 31 23:25:59 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:25:59 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:25:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19340 >/dev/null 2>/dev/null
selfserv with PID 19340 found at Wed May 31 23:25:59 UTC 2017
selfserv with PID 19340 started at Wed May 31 23:25:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1880: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19340 at Wed May 31 23:26:00 UTC 2017
kill -USR1 19340
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19340 killed at Wed May 31 23:26:00 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:26:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19397 >/dev/null 2>/dev/null
selfserv with PID 19397 found at Wed May 31 23:26:00 UTC 2017
selfserv with PID 19397 started at Wed May 31 23:26:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1881: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19397 at Wed May 31 23:26:01 UTC 2017
kill -USR1 19397
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19397 killed at Wed May 31 23:26:01 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:26:02 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19454 >/dev/null 2>/dev/null
selfserv with PID 19454 found at Wed May 31 23:26:02 UTC 2017
selfserv with PID 19454 started at Wed May 31 23:26:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1882: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19454 at Wed May 31 23:26:03 UTC 2017
kill -USR1 19454
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19454 killed at Wed May 31 23:26:03 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:26:03 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19511 >/dev/null 2>/dev/null
selfserv with PID 19511 found at Wed May 31 23:26:03 UTC 2017
selfserv with PID 19511 started at Wed May 31 23:26:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1883: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19511 at Wed May 31 23:26:05 UTC 2017
kill -USR1 19511
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19511 killed at Wed May 31 23:26:05 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:26:05 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19568 >/dev/null 2>/dev/null
selfserv with PID 19568 found at Wed May 31 23:26:05 UTC 2017
selfserv with PID 19568 started at Wed May 31 23:26:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1884: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19568 at Wed May 31 23:26:06 UTC 2017
kill -USR1 19568
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19568 killed at Wed May 31 23:26:06 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:26:06 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19625 >/dev/null 2>/dev/null
selfserv with PID 19625 found at Wed May 31 23:26:06 UTC 2017
selfserv with PID 19625 started at Wed May 31 23:26:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1885: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19625 at Wed May 31 23:26:08 UTC 2017
kill -USR1 19625
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19625 killed at Wed May 31 23:26:08 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:26:08 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19682 >/dev/null 2>/dev/null
selfserv with PID 19682 found at Wed May 31 23:26:08 UTC 2017
selfserv with PID 19682 started at Wed May 31 23:26:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1886: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19682 at Wed May 31 23:26:09 UTC 2017
kill -USR1 19682
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19682 killed at Wed May 31 23:26:09 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:26:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19739 >/dev/null 2>/dev/null
selfserv with PID 19739 found at Wed May 31 23:26:09 UTC 2017
selfserv with PID 19739 started at Wed May 31 23:26:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1887: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19739 at Wed May 31 23:26:11 UTC 2017
kill -USR1 19739
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19739 killed at Wed May 31 23:26:11 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:26:11 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19796 >/dev/null 2>/dev/null
selfserv with PID 19796 found at Wed May 31 23:26:11 UTC 2017
selfserv with PID 19796 started at Wed May 31 23:26:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1888: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 19796 at Wed May 31 23:26:12 UTC 2017
kill -USR1 19796
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19796 killed at Wed May 31 23:26:12 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:26:12 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19853 >/dev/null 2>/dev/null
selfserv with PID 19853 found at Wed May 31 23:26:12 UTC 2017
selfserv with PID 19853 started at Wed May 31 23:26:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1889: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19853 at Wed May 31 23:26:14 UTC 2017
kill -USR1 19853
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19853 killed at Wed May 31 23:26:14 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:26:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19910 >/dev/null 2>/dev/null
selfserv with PID 19910 found at Wed May 31 23:26:14 UTC 2017
selfserv with PID 19910 started at Wed May 31 23:26:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1890: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19910 at Wed May 31 23:26:15 UTC 2017
kill -USR1 19910
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19910 killed at Wed May 31 23:26:15 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:26:15 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19967 >/dev/null 2>/dev/null
selfserv with PID 19967 found at Wed May 31 23:26:15 UTC 2017
selfserv with PID 19967 started at Wed May 31 23:26:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1891: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 19967 at Wed May 31 23:26:17 UTC 2017
kill -USR1 19967
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19967 killed at Wed May 31 23:26:17 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:26:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20024 >/dev/null 2>/dev/null
selfserv with PID 20024 found at Wed May 31 23:26:17 UTC 2017
selfserv with PID 20024 started at Wed May 31 23:26:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1892: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20024 at Wed May 31 23:26:18 UTC 2017
kill -USR1 20024
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20024 killed at Wed May 31 23:26:18 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:26:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20082 >/dev/null 2>/dev/null
selfserv with PID 20082 found at Wed May 31 23:26:18 UTC 2017
selfserv with PID 20082 started at Wed May 31 23:26:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1893: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20082 at Wed May 31 23:26:19 UTC 2017
kill -USR1 20082
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20082 killed at Wed May 31 23:26:19 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:26:19 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20139 >/dev/null 2>/dev/null
selfserv with PID 20139 found at Wed May 31 23:26:20 UTC 2017
selfserv with PID 20139 started at Wed May 31 23:26:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1894: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20139 at Wed May 31 23:26:21 UTC 2017
kill -USR1 20139
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20139 killed at Wed May 31 23:26:21 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:26:21 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20196 >/dev/null 2>/dev/null
selfserv with PID 20196 found at Wed May 31 23:26:21 UTC 2017
selfserv with PID 20196 started at Wed May 31 23:26:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1895: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20196 at Wed May 31 23:26:22 UTC 2017
kill -USR1 20196
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20196 killed at Wed May 31 23:26:22 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed May 31 23:26:22 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20268 >/dev/null 2>/dev/null
selfserv with PID 20268 found at Wed May 31 23:26:22 UTC 2017
selfserv with PID 20268 started at Wed May 31 23:26:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1896: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20268 at Wed May 31 23:26:23 UTC 2017
kill -USR1 20268
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20268 killed at Wed May 31 23:26:23 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed May 31 23:26:23 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20325 >/dev/null 2>/dev/null
selfserv with PID 20325 found at Wed May 31 23:26:24 UTC 2017
selfserv with PID 20325 started at Wed May 31 23:26:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1897: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20325 at Wed May 31 23:26:25 UTC 2017
kill -USR1 20325
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20325 killed at Wed May 31 23:26:25 UTC 2017
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Wed May 31 23:26:25 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20382 >/dev/null 2>/dev/null
selfserv with PID 20382 found at Wed May 31 23:26:25 UTC 2017
selfserv with PID 20382 started at Wed May 31 23:26:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1898: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20382 at Wed May 31 23:26:26 UTC 2017
kill -USR1 20382
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20382 killed at Wed May 31 23:26:26 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed May 31 23:26:26 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20439 >/dev/null 2>/dev/null
selfserv with PID 20439 found at Wed May 31 23:26:26 UTC 2017
selfserv with PID 20439 started at Wed May 31 23:26:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1899: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20439 at Wed May 31 23:26:27 UTC 2017
kill -USR1 20439
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20439 killed at Wed May 31 23:26:27 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed May 31 23:26:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20496 >/dev/null 2>/dev/null
selfserv with PID 20496 found at Wed May 31 23:26:27 UTC 2017
selfserv with PID 20496 started at Wed May 31 23:26:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1900: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20496 at Wed May 31 23:26:28 UTC 2017
kill -USR1 20496
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20496 killed at Wed May 31 23:26:28 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed May 31 23:26:29 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20553 >/dev/null 2>/dev/null
selfserv with PID 20553 found at Wed May 31 23:26:29 UTC 2017
selfserv with PID 20553 started at Wed May 31 23:26:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1901: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20553 at Wed May 31 23:26:30 UTC 2017
kill -USR1 20553
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20553 killed at Wed May 31 23:26:30 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Wed May 31 23:26:30 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20610 >/dev/null 2>/dev/null
selfserv with PID 20610 found at Wed May 31 23:26:30 UTC 2017
selfserv with PID 20610 started at Wed May 31 23:26:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #1902: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20610 at Wed May 31 23:26:31 UTC 2017
kill -USR1 20610
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20610 killed at Wed May 31 23:26:31 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed May 31 23:26:31 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20667 >/dev/null 2>/dev/null
selfserv with PID 20667 found at Wed May 31 23:26:31 UTC 2017
selfserv with PID 20667 started at Wed May 31 23:26:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1903: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20667 at Wed May 31 23:26:32 UTC 2017
kill -USR1 20667
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20667 killed at Wed May 31 23:26:32 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:26:33 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20779 >/dev/null 2>/dev/null
selfserv with PID 20779 found at Wed May 31 23:26:33 UTC 2017
selfserv with PID 20779 started at Wed May 31 23:26:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1904: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20779 at Wed May 31 23:26:34 UTC 2017
kill -USR1 20779
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20779 killed at Wed May 31 23:26:34 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:26:34 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20836 >/dev/null 2>/dev/null
selfserv with PID 20836 found at Wed May 31 23:26:34 UTC 2017
selfserv with PID 20836 started at Wed May 31 23:26:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1905: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20836 at Wed May 31 23:26:36 UTC 2017
kill -USR1 20836
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20836 killed at Wed May 31 23:26:36 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:26:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20893 >/dev/null 2>/dev/null
selfserv with PID 20893 found at Wed May 31 23:26:36 UTC 2017
selfserv with PID 20893 started at Wed May 31 23:26:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1906: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 20893 at Wed May 31 23:26:37 UTC 2017
kill -USR1 20893
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20893 killed at Wed May 31 23:26:37 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:26:37 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20950 >/dev/null 2>/dev/null
selfserv with PID 20950 found at Wed May 31 23:26:37 UTC 2017
selfserv with PID 20950 started at Wed May 31 23:26:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1907: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20950 at Wed May 31 23:26:38 UTC 2017
kill -USR1 20950
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20950 killed at Wed May 31 23:26:38 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:26:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21007 >/dev/null 2>/dev/null
selfserv with PID 21007 found at Wed May 31 23:26:39 UTC 2017
selfserv with PID 21007 started at Wed May 31 23:26:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1908: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21007 at Wed May 31 23:26:40 UTC 2017
kill -USR1 21007
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21007 killed at Wed May 31 23:26:40 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:26:40 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21064 >/dev/null 2>/dev/null
selfserv with PID 21064 found at Wed May 31 23:26:40 UTC 2017
selfserv with PID 21064 started at Wed May 31 23:26:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1909: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21064 at Wed May 31 23:26:42 UTC 2017
kill -USR1 21064
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21064 killed at Wed May 31 23:26:42 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:26:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21121 >/dev/null 2>/dev/null
selfserv with PID 21121 found at Wed May 31 23:26:42 UTC 2017
selfserv with PID 21121 started at Wed May 31 23:26:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1910: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21121 at Wed May 31 23:26:44 UTC 2017
kill -USR1 21121
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21121 killed at Wed May 31 23:26:44 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:26:44 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21178 >/dev/null 2>/dev/null
selfserv with PID 21178 found at Wed May 31 23:26:44 UTC 2017
selfserv with PID 21178 started at Wed May 31 23:26:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1911: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21178 at Wed May 31 23:26:45 UTC 2017
kill -USR1 21178
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21178 killed at Wed May 31 23:26:45 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:26:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21235 >/dev/null 2>/dev/null
selfserv with PID 21235 found at Wed May 31 23:26:46 UTC 2017
selfserv with PID 21235 started at Wed May 31 23:26:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1912: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21235 at Wed May 31 23:26:47 UTC 2017
kill -USR1 21235
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21235 killed at Wed May 31 23:26:47 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:26:47 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21292 >/dev/null 2>/dev/null
selfserv with PID 21292 found at Wed May 31 23:26:47 UTC 2017
selfserv with PID 21292 started at Wed May 31 23:26:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1913: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21292 at Wed May 31 23:26:48 UTC 2017
kill -USR1 21292
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21292 killed at Wed May 31 23:26:48 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:26:48 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21349 >/dev/null 2>/dev/null
selfserv with PID 21349 found at Wed May 31 23:26:48 UTC 2017
selfserv with PID 21349 started at Wed May 31 23:26:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #1914: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21349 at Wed May 31 23:26:49 UTC 2017
kill -USR1 21349
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21349 killed at Wed May 31 23:26:50 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:26:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21406 >/dev/null 2>/dev/null
selfserv with PID 21406 found at Wed May 31 23:26:50 UTC 2017
selfserv with PID 21406 started at Wed May 31 23:26:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1915: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21406 at Wed May 31 23:26:51 UTC 2017
kill -USR1 21406
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21406 killed at Wed May 31 23:26:51 UTC 2017
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Wed May 31 23:26:52 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21484 >/dev/null 2>/dev/null
selfserv with PID 21484 found at Wed May 31 23:26:52 UTC 2017
selfserv with PID 21484 started at Wed May 31 23:26:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1916: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21484 at Wed May 31 23:26:53 UTC 2017
kill -USR1 21484
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21484 killed at Wed May 31 23:26:53 UTC 2017
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Wed May 31 23:26:53 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21547 >/dev/null 2>/dev/null
selfserv with PID 21547 found at Wed May 31 23:26:53 UTC 2017
selfserv with PID 21547 started at Wed May 31 23:26:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -c v -w nss -n TestUser -a testwandboard-sni.(none) < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=testwandboard-sni.(none),E=testwandboard-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1917: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21547 at Wed May 31 23:26:54 UTC 2017
kill -USR1 21547
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21547 killed at Wed May 31 23:26:54 UTC 2017
ssl.sh: TLS Server response with alert ----
selfserv starting at Wed May 31 23:26:54 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21610 >/dev/null 2>/dev/null
selfserv with PID 21610 found at Wed May 31 23:26:54 UTC 2017
selfserv with PID 21610 started at Wed May 31 23:26:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -c v -w nss -n TestUser -a testwandboard-sni1.(none) < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #1918: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21610 at Wed May 31 23:26:55 UTC 2017
kill -USR1 21610
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21610 killed at Wed May 31 23:26:55 UTC 2017
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Wed May 31 23:26:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21673 >/dev/null 2>/dev/null
selfserv with PID 21673 found at Wed May 31 23:26:55 UTC 2017
selfserv with PID 21673 started at Wed May 31 23:26:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -w nss -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1919: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21673 at Wed May 31 23:26:56 UTC 2017
kill -USR1 21673
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21673 killed at Wed May 31 23:26:56 UTC 2017
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Wed May 31 23:26:56 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21736 >/dev/null 2>/dev/null
selfserv with PID 21736 found at Wed May 31 23:26:56 UTC 2017
selfserv with PID 21736 started at Wed May 31 23:26:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -c v -w nss -n TestUser -a testwandboard-sni.(none) < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #1920: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21736 at Wed May 31 23:26:57 UTC 2017
kill -USR1 21736
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21736 killed at Wed May 31 23:26:57 UTC 2017
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Wed May 31 23:26:57 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21799 >/dev/null 2>/dev/null
selfserv with PID 21799 found at Wed May 31 23:26:57 UTC 2017
selfserv with PID 21799 started at Wed May 31 23:26:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1921: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21799 at Wed May 31 23:26:58 UTC 2017
kill -USR1 21799
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21799 killed at Wed May 31 23:26:58 UTC 2017
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Wed May 31 23:26:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:26:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21862 >/dev/null 2>/dev/null
selfserv with PID 21862 found at Wed May 31 23:26:58 UTC 2017
selfserv with PID 21862 started at Wed May 31 23:26:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -c v -w nss -n TestUser -a testwandboard-sni.(none) < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=testwandboard-sni.(none),E=testwandboard-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=testwandboard-sni.(none),E=testwandboard-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1922: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21862 at Wed May 31 23:26:59 UTC 2017
kill -USR1 21862
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21862 killed at Wed May 31 23:27:00 UTC 2017
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Wed May 31 23:27:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:27:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21925 >/dev/null 2>/dev/null
selfserv with PID 21925 found at Wed May 31 23:27:00 UTC 2017
selfserv with PID 21925 started at Wed May 31 23:27:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser -a testwandboard-sni.(none) -a testwandboard.(none) < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #1923: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21925 at Wed May 31 23:27:01 UTC 2017
kill -USR1 21925
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21925 killed at Wed May 31 23:27:01 UTC 2017
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Wed May 31 23:27:01 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:27:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21988 >/dev/null 2>/dev/null
selfserv with PID 21988 found at Wed May 31 23:27:01 UTC 2017
selfserv with PID 21988 started at Wed May 31 23:27:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -c v -w nss -n TestUser -a testwandboard-sni.(none) -a testwandboard-sni1.(none) < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=testwandboard-sni.(none),E=testwandboard-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #1924: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21988 at Wed May 31 23:27:02 UTC 2017
kill -USR1 21988
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21988 killed at Wed May 31 23:27:02 UTC 2017
ssl.sh: TLS Server response with alert ----
selfserv starting at Wed May 31 23:27:02 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:27:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22051 >/dev/null 2>/dev/null
selfserv with PID 22051 found at Wed May 31 23:27:02 UTC 2017
selfserv with PID 22051 started at Wed May 31 23:27:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -c v -w nss -n TestUser -a testwandboard-sni1.(none) < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #1925: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22051 at Wed May 31 23:27:03 UTC 2017
kill -USR1 22051
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22051 killed at Wed May 31 23:27:03 UTC 2017
./ssl.sh: line 1071: [: -nz: unary operator expected
ssl.sh: SSL Stress Test - server bypass/client normal - with ECC ===============================
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Wed May 31 23:27:03 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:27:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22161 >/dev/null 2>/dev/null
selfserv with PID 22161 found at Wed May 31 23:27:03 UTC 2017
selfserv with PID 22161 started at Wed May 31 23:27:03 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -c 1000 -C c -V ssl3:ssl3 \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:27:03 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:27:05 UTC 2017
ssl.sh: #1926: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 22161 at Wed May 31 23:27:05 UTC 2017
kill -USR1 22161
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22161 killed at Wed May 31 23:27:05 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 ----
selfserv starting at Wed May 31 23:27:05 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:27:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22235 >/dev/null 2>/dev/null
selfserv with PID 22235 found at Wed May 31 23:27:05 UTC 2017
selfserv with PID 22235 started at Wed May 31 23:27:05 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -c 1000 -C c \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:27:05 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:27:07 UTC 2017
ssl.sh: #1927: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 22235 at Wed May 31 23:27:07 UTC 2017
kill -USR1 22235
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22235 killed at Wed May 31 23:27:07 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (false start) ----
selfserv starting at Wed May 31 23:27:07 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:27:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22309 >/dev/null 2>/dev/null
selfserv with PID 22309 found at Wed May 31 23:27:08 UTC 2017
selfserv with PID 22309 started at Wed May 31 23:27:08 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -c 1000 -C c -g \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:27:08 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:27:09 UTC 2017
ssl.sh: #1928: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 22309 at Wed May 31 23:27:09 UTC 2017
kill -USR1 22309
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22309 killed at Wed May 31 23:27:09 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ----
selfserv starting at Wed May 31 23:27:10 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:27:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22383 >/dev/null 2>/dev/null
selfserv with PID 22383 found at Wed May 31 23:27:10 UTC 2017
selfserv with PID 22383 started at Wed May 31 23:27:10 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C c -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:27:10 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Wed May 31 23:27:11 UTC 2017
ssl.sh: #1929: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 22383 at Wed May 31 23:27:12 UTC 2017
kill -USR1 22383
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22383 killed at Wed May 31 23:27:12 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression) ----
selfserv starting at Wed May 31 23:27:12 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:27:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22457 >/dev/null 2>/dev/null
selfserv with PID 22457 found at Wed May 31 23:27:12 UTC 2017
selfserv with PID 22457 started at Wed May 31 23:27:12 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C c -z \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:27:12 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:27:14 UTC 2017
ssl.sh: #1930: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 22457 at Wed May 31 23:27:14 UTC 2017
kill -USR1 22457
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22457 killed at Wed May 31 23:27:14 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Wed May 31 23:27:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:27:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22531 >/dev/null 2>/dev/null
selfserv with PID 22531 found at Wed May 31 23:27:14 UTC 2017
selfserv with PID 22531 started at Wed May 31 23:27:14 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:27:14 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Wed May 31 23:27:17 UTC 2017
ssl.sh: #1931: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 22531 at Wed May 31 23:27:17 UTC 2017
kill -USR1 22531
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22531 killed at Wed May 31 23:27:17 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Wed May 31 23:27:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:27:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22605 >/dev/null 2>/dev/null
selfserv with PID 22605 found at Wed May 31 23:27:17 UTC 2017
selfserv with PID 22605 started at Wed May 31 23:27:17 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z -g \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:27:17 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Wed May 31 23:27:19 UTC 2017
ssl.sh: #1932: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 22605 at Wed May 31 23:27:19 UTC 2017
kill -USR1 22605
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22605 killed at Wed May 31 23:27:19 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Wed May 31 23:27:20 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:27:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22685 >/dev/null 2>/dev/null
selfserv with PID 22685 found at Wed May 31 23:27:20 UTC 2017
selfserv with PID 22685 started at Wed May 31 23:27:20 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V tls1.0:tls1.2 -c 1000 -C c -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:27:20 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Wed May 31 23:27:22 UTC 2017
ssl.sh: #1933: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 22685 at Wed May 31 23:27:22 UTC 2017
kill -USR1 22685
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22685 killed at Wed May 31 23:27:22 UTC 2017
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed May 31 23:27:22 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:27:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22774 >/dev/null 2>/dev/null
selfserv with PID 22774 found at Wed May 31 23:27:22 UTC 2017
selfserv with PID 22774 started at Wed May 31 23:27:22 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -c 100 -C c -V ssl3:ssl3 -N -n TestUser \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:27:22 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:27:27 UTC 2017
ssl.sh: #1934: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 22774 at Wed May 31 23:27:27 UTC 2017
kill -USR1 22774
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22774 killed at Wed May 31 23:27:27 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed May 31 23:27:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:27:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22847 >/dev/null 2>/dev/null
selfserv with PID 22847 found at Wed May 31 23:27:27 UTC 2017
selfserv with PID 22847 started at Wed May 31 23:27:27 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -c 100 -C c -N -n TestUser \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:27:27 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:27:31 UTC 2017
ssl.sh: #1935: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 22847 at Wed May 31 23:27:31 UTC 2017
kill -USR1 22847
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22847 killed at Wed May 31 23:27:32 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Wed May 31 23:27:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:27:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22920 >/dev/null 2>/dev/null
selfserv with PID 22920 found at Wed May 31 23:27:32 UTC 2017
selfserv with PID 22920 started at Wed May 31 23:27:32 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:27:32 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Wed May 31 23:27:33 UTC 2017
ssl.sh: #1936: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 22920 at Wed May 31 23:27:33 UTC 2017
kill -USR1 22920
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22920 killed at Wed May 31 23:27:33 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Wed May 31 23:27:33 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:27:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22994 >/dev/null 2>/dev/null
selfserv with PID 22994 found at Wed May 31 23:27:33 UTC 2017
selfserv with PID 22994 started at Wed May 31 23:27:33 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -z \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:27:33 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:27:34 UTC 2017
ssl.sh: #1937: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 22994 at Wed May 31 23:27:34 UTC 2017
kill -USR1 22994
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22994 killed at Wed May 31 23:27:34 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Wed May 31 23:27:34 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:27:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23068 >/dev/null 2>/dev/null
selfserv with PID 23068 found at Wed May 31 23:27:34 UTC 2017
selfserv with PID 23068 started at Wed May 31 23:27:34 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -z -g \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:27:34 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:27:35 UTC 2017
ssl.sh: #1938: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 23068 at Wed May 31 23:27:35 UTC 2017
kill -USR1 23068
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23068 killed at Wed May 31 23:27:36 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Wed May 31 23:27:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:27:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23142 >/dev/null 2>/dev/null
selfserv with PID 23142 found at Wed May 31 23:27:36 UTC 2017
selfserv with PID 23142 started at Wed May 31 23:27:36 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u -z \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:27:36 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Wed May 31 23:27:37 UTC 2017
ssl.sh: #1939: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 23142 at Wed May 31 23:27:37 UTC 2017
kill -USR1 23142
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23142 killed at Wed May 31 23:27:37 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Wed May 31 23:27:37 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:27:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23217 >/dev/null 2>/dev/null
selfserv with PID 23217 found at Wed May 31 23:27:37 UTC 2017
selfserv with PID 23217 started at Wed May 31 23:27:37 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u -z -g \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:27:37 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Wed May 31 23:27:38 UTC 2017
ssl.sh: #1940: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 23217 at Wed May 31 23:27:38 UTC 2017
kill -USR1 23217
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23217 killed at Wed May 31 23:27:38 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Wed May 31 23:27:38 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:27:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23297 >/dev/null 2>/dev/null
selfserv with PID 23297 found at Wed May 31 23:27:38 UTC 2017
selfserv with PID 23297 started at Wed May 31 23:27:38 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V tls1.0:tls1.2 -c 1000 -C c -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:27:38 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Wed May 31 23:27:41 UTC 2017
ssl.sh: #1941: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 23297 at Wed May 31 23:27:41 UTC 2017
kill -USR1 23297
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23297 killed at Wed May 31 23:27:41 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Wed May 31 23:27:41 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -a testwandboard-sni.(none) -k testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:27:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23377 >/dev/null 2>/dev/null
selfserv with PID 23377 found at Wed May 31 23:27:41 UTC 2017
selfserv with PID 23377 started at Wed May 31 23:27:41 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V tls1.0:tls1.2 -c 1000 -C c -u -a testwandboard-sni.(none) \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:27:41 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Wed May 31 23:27:43 UTC 2017
ssl.sh: #1942: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 23377 at Wed May 31 23:27:44 UTC 2017
kill -USR1 23377
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23377 killed at Wed May 31 23:27:44 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed May 31 23:27:44 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:27:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23466 >/dev/null 2>/dev/null
selfserv with PID 23466 found at Wed May 31 23:27:44 UTC 2017
selfserv with PID 23466 started at Wed May 31 23:27:44 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C009 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:27:44 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:27:52 UTC 2017
ssl.sh: #1943: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 23466 at Wed May 31 23:27:52 UTC 2017
kill -USR1 23466
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23466 killed at Wed May 31 23:27:52 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ----
selfserv starting at Wed May 31 23:27:52 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C023 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:27:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23544 >/dev/null 2>/dev/null
selfserv with PID 23544 found at Wed May 31 23:27:52 UTC 2017
selfserv with PID 23544 started at Wed May 31 23:27:52 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C023 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:27:52 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:27:59 UTC 2017
ssl.sh: #1944: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 23544 at Wed May 31 23:28:00 UTC 2017
kill -USR1 23544
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23544 killed at Wed May 31 23:28:00 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ----
selfserv starting at Wed May 31 23:28:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02B -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:28:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23617 >/dev/null 2>/dev/null
selfserv with PID 23617 found at Wed May 31 23:28:00 UTC 2017
selfserv with PID 23617 started at Wed May 31 23:28:00 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C02B -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:28:00 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:28:08 UTC 2017
ssl.sh: #1945: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 23617 at Wed May 31 23:28:08 UTC 2017
kill -USR1 23617
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23617 killed at Wed May 31 23:28:08 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed May 31 23:28:08 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:28:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24000 >/dev/null 2>/dev/null
selfserv with PID 24000 found at Wed May 31 23:28:08 UTC 2017
selfserv with PID 24000 started at Wed May 31 23:28:09 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C004 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:28:09 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:28:18 UTC 2017
ssl.sh: #1946: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 24000 at Wed May 31 23:28:18 UTC 2017
kill -USR1 24000
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24000 killed at Wed May 31 23:28:18 UTC 2017
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed May 31 23:28:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C00E -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:28:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24074 >/dev/null 2>/dev/null
selfserv with PID 24074 found at Wed May 31 23:28:18 UTC 2017
selfserv with PID 24074 started at Wed May 31 23:28:18 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C00E -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:28:18 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:28:25 UTC 2017
ssl.sh: #1947: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 24074 at Wed May 31 23:28:25 UTC 2017
kill -USR1 24074
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24074 killed at Wed May 31 23:28:25 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ----
selfserv starting at Wed May 31 23:28:25 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C013 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:28:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24147 >/dev/null 2>/dev/null
selfserv with PID 24147 found at Wed May 31 23:28:25 UTC 2017
selfserv with PID 24147 started at Wed May 31 23:28:25 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :C013 \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:28:25 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:28:27 UTC 2017
ssl.sh: #1948: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 24147 at Wed May 31 23:28:28 UTC 2017
kill -USR1 24147
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24147 killed at Wed May 31 23:28:28 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ----
selfserv starting at Wed May 31 23:28:28 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C027 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:28:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24221 >/dev/null 2>/dev/null
selfserv with PID 24221 found at Wed May 31 23:28:28 UTC 2017
selfserv with PID 24221 started at Wed May 31 23:28:28 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :C027 \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:28:28 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:28:30 UTC 2017
ssl.sh: #1949: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 24221 at Wed May 31 23:28:30 UTC 2017
kill -USR1 24221
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24221 killed at Wed May 31 23:28:30 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ----
selfserv starting at Wed May 31 23:28:30 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02F -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:28:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24295 >/dev/null 2>/dev/null
selfserv with PID 24295 found at Wed May 31 23:28:30 UTC 2017
selfserv with PID 24295 started at Wed May 31 23:28:30 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :C02F \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:28:30 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:28:32 UTC 2017
ssl.sh: #1950: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 24295 at Wed May 31 23:28:32 UTC 2017
kill -USR1 24295
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24295 killed at Wed May 31 23:28:32 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ----
selfserv starting at Wed May 31 23:28:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:28:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24369 >/dev/null 2>/dev/null
selfserv with PID 24369 found at Wed May 31 23:28:32 UTC 2017
selfserv with PID 24369 started at Wed May 31 23:28:32 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :C004 -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:28:32 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Wed May 31 23:28:34 UTC 2017
ssl.sh: #1951: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 24369 at Wed May 31 23:28:35 UTC 2017
kill -USR1 24369
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24369 killed at Wed May 31 23:28:35 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ----
selfserv starting at Wed May 31 23:28:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:28:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24443 >/dev/null 2>/dev/null
selfserv with PID 24443 found at Wed May 31 23:28:35 UTC 2017
selfserv with PID 24443 started at Wed May 31 23:28:35 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C009 -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:28:35 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Wed May 31 23:28:36 UTC 2017
ssl.sh: #1952: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 24443 at Wed May 31 23:28:36 UTC 2017
kill -USR1 24443
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24443 killed at Wed May 31 23:28:36 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed May 31 23:28:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C009 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:28:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24532 >/dev/null 2>/dev/null
selfserv with PID 24532 found at Wed May 31 23:28:36 UTC 2017
selfserv with PID 24532 started at Wed May 31 23:28:36 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 10 -C :C009 -N -n TestUser-ec \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:28:36 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed May 31 23:28:38 UTC 2017
ssl.sh: #1953: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 24532 at Wed May 31 23:28:39 UTC 2017
kill -USR1 24532
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24532 killed at Wed May 31 23:28:39 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Wed May 31 23:28:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:28:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24605 >/dev/null 2>/dev/null
selfserv with PID 24605 found at Wed May 31 23:28:39 UTC 2017
selfserv with PID 24605 started at Wed May 31 23:28:39 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:28:39 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:28:40 UTC 2017
ssl.sh: #1954: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 24605 at Wed May 31 23:28:40 UTC 2017
kill -USR1 24605
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24605 killed at Wed May 31 23:28:40 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed May 31 23:28:40 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C004 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:28:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24679 >/dev/null 2>/dev/null
selfserv with PID 24679 found at Wed May 31 23:28:40 UTC 2017
selfserv with PID 24679 started at Wed May 31 23:28:40 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 10 -C :C004 -N -n TestUser-ec \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:28:40 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed May 31 23:28:43 UTC 2017
ssl.sh: #1955: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 24679 at Wed May 31 23:28:43 UTC 2017
kill -USR1 24679
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24679 killed at Wed May 31 23:28:43 UTC 2017
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed May 31 23:28:43 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -r -r -c :C00E -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:28:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24752 >/dev/null 2>/dev/null
selfserv with PID 24752 found at Wed May 31 23:28:43 UTC 2017
selfserv with PID 24752 started at Wed May 31 23:28:43 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 10 -C :C00E -N -n TestUser-ecmixed \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:28:43 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed May 31 23:28:45 UTC 2017
ssl.sh: #1956: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 24752 at Wed May 31 23:28:45 UTC 2017
kill -USR1 24752
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24752 killed at Wed May 31 23:28:45 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Wed May 31 23:28:45 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:28:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24825 >/dev/null 2>/dev/null
selfserv with PID 24825 found at Wed May 31 23:28:45 UTC 2017
selfserv with PID 24825 started at Wed May 31 23:28:45 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:28:45 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:28:46 UTC 2017
ssl.sh: #1957: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 24825 at Wed May 31 23:28:46 UTC 2017
kill -USR1 24825
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24825 killed at Wed May 31 23:28:46 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Wed May 31 23:28:47 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:28:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24899 >/dev/null 2>/dev/null
selfserv with PID 24899 found at Wed May 31 23:28:47 UTC 2017
selfserv with PID 24899 started at Wed May 31 23:28:47 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:28:47 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Wed May 31 23:28:48 UTC 2017
ssl.sh: #1958: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 24899 at Wed May 31 23:28:48 UTC 2017
kill -USR1 24899
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24899 killed at Wed May 31 23:28:48 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ----
selfserv starting at Wed May 31 23:28:48 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0016 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:28:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24988 >/dev/null 2>/dev/null
selfserv with PID 24988 found at Wed May 31 23:28:48 UTC 2017
selfserv with PID 24988 started at Wed May 31 23:28:48 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :0016 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:28:48 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:28:54 UTC 2017
ssl.sh: #1959: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 24988 at Wed May 31 23:28:54 UTC 2017
kill -USR1 24988
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24988 killed at Wed May 31 23:28:54 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ----
selfserv starting at Wed May 31 23:28:54 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0033 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:28:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25061 >/dev/null 2>/dev/null
selfserv with PID 25061 found at Wed May 31 23:28:54 UTC 2017
selfserv with PID 25061 started at Wed May 31 23:28:54 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :0033 \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:28:54 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:28:56 UTC 2017
ssl.sh: #1960: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 25061 at Wed May 31 23:28:57 UTC 2017
kill -USR1 25061
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25061 killed at Wed May 31 23:28:57 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Wed May 31 23:28:57 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0039 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:28:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25135 >/dev/null 2>/dev/null
selfserv with PID 25135 found at Wed May 31 23:28:57 UTC 2017
selfserv with PID 25135 started at Wed May 31 23:28:57 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :0039 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:28:57 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:29:03 UTC 2017
ssl.sh: #1961: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 25135 at Wed May 31 23:29:03 UTC 2017
kill -USR1 25135
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25135 killed at Wed May 31 23:29:03 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ----
selfserv starting at Wed May 31 23:29:03 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0040 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:29:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25208 >/dev/null 2>/dev/null
selfserv with PID 25208 found at Wed May 31 23:29:03 UTC 2017
selfserv with PID 25208 started at Wed May 31 23:29:03 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :0040 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:29:03 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:29:10 UTC 2017
ssl.sh: #1962: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 25208 at Wed May 31 23:29:10 UTC 2017
kill -USR1 25208
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25208 killed at Wed May 31 23:29:10 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Wed May 31 23:29:10 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0038 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:29:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25292 >/dev/null 2>/dev/null
selfserv with PID 25292 found at Wed May 31 23:29:11 UTC 2017
selfserv with PID 25292 started at Wed May 31 23:29:11 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :0038 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:29:11 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Wed May 31 23:30:17 UTC 2017
ssl.sh: #1963: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 25292 at Wed May 31 23:30:17 UTC 2017
kill -USR1 25292
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25292 killed at Wed May 31 23:30:17 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ----
selfserv starting at Wed May 31 23:30:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006A -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:30:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25641 >/dev/null 2>/dev/null
selfserv with PID 25641 found at Wed May 31 23:30:17 UTC 2017
selfserv with PID 25641 started at Wed May 31 23:30:17 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :006A -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:30:17 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Wed May 31 23:31:22 UTC 2017
ssl.sh: #1964: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 25641 at Wed May 31 23:31:22 UTC 2017
kill -USR1 25641
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25641 killed at Wed May 31 23:31:22 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ----
selfserv starting at Wed May 31 23:31:22 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006B -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:31:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25803 >/dev/null 2>/dev/null
selfserv with PID 25803 found at Wed May 31 23:31:23 UTC 2017
selfserv with PID 25803 started at Wed May 31 23:31:23 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :006B -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:31:23 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 7 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:31:28 UTC 2017
ssl.sh: #1965: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 25803 at Wed May 31 23:31:29 UTC 2017
kill -USR1 25803
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25803 killed at Wed May 31 23:31:29 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ----
selfserv starting at Wed May 31 23:31:29 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009E -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:31:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25877 >/dev/null 2>/dev/null
selfserv with PID 25877 found at Wed May 31 23:31:29 UTC 2017
selfserv with PID 25877 started at Wed May 31 23:31:29 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :009E -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:31:29 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:31:35 UTC 2017
ssl.sh: #1966: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 25877 at Wed May 31 23:31:35 UTC 2017
kill -USR1 25877
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25877 killed at Wed May 31 23:31:35 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) ----
selfserv starting at Wed May 31 23:31:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009F -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:31:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25950 >/dev/null 2>/dev/null
selfserv with PID 25950 found at Wed May 31 23:31:35 UTC 2017
selfserv with PID 25950 started at Wed May 31 23:31:35 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :009F -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:31:35 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:31:41 UTC 2017
ssl.sh: #1967: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 25950 at Wed May 31 23:31:41 UTC 2017
kill -USR1 25950
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25950 killed at Wed May 31 23:31:41 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ----
selfserv starting at Wed May 31 23:31:41 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0032 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:31:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26038 >/dev/null 2>/dev/null
selfserv with PID 26038 found at Wed May 31 23:31:41 UTC 2017
selfserv with PID 26038 started at Wed May 31 23:31:41 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :0032 -N -n TestUser-dsa \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:31:41 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:31:52 UTC 2017
ssl.sh: #1968: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 26038 at Wed May 31 23:31:52 UTC 2017
kill -USR1 26038
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26038 killed at Wed May 31 23:31:52 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ----
selfserv starting at Wed May 31 23:31:52 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0067 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:31:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26111 >/dev/null 2>/dev/null
selfserv with PID 26111 found at Wed May 31 23:31:52 UTC 2017
selfserv with PID 26111 started at Wed May 31 23:31:52 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :0067 -n TestUser-dsamixed \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:31:52 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:31:54 UTC 2017
ssl.sh: #1969: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 26111 at Wed May 31 23:31:55 UTC 2017
kill -USR1 26111
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26111 killed at Wed May 31 23:31:55 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ----
selfserv starting at Wed May 31 23:31:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:31:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26200 >/dev/null 2>/dev/null
selfserv with PID 26200 found at Wed May 31 23:31:55 UTC 2017
selfserv with PID 26200 started at Wed May 31 23:31:55 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :00A2 -N -n TestUser-dsa \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:31:55 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Wed May 31 23:33:32 UTC 2017
ssl.sh: #1970: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 26200 at Wed May 31 23:33:32 UTC 2017
kill -USR1 26200
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26200 killed at Wed May 31 23:33:32 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) ----
selfserv starting at Wed May 31 23:33:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A3 -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:33:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26581 >/dev/null 2>/dev/null
selfserv with PID 26581 found at Wed May 31 23:33:33 UTC 2017
selfserv with PID 26581 started at Wed May 31 23:33:33 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :00A3 -N -n TestUser-dsa \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:33:33 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Wed May 31 23:35:12 UTC 2017
ssl.sh: #1971: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 26581 at Wed May 31 23:35:12 UTC 2017
kill -USR1 26581
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26581 killed at Wed May 31 23:35:12 UTC 2017
ssl.sh: SSL Cipher Coverage Extended Test - server bypass/client normal - with ECC ===============================
selfserv starting at Wed May 31 23:35:12 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:35:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:12 UTC 2017
selfserv with PID 26787 started at Wed May 31 23:35:12 UTC 2017
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1972: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1973: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1974: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1975: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1976: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1977: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1978: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1979: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1980: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1981: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1982: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1983: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1984: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1985: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009F -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1986: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A3 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1987: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009D -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1988: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1989: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1990: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1991: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1992: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1993: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1994: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1995: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1996: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1997: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1998: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #1999: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2000: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2001: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2002: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2003: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2004: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2005: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2006: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2007: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2008: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2009: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2010: TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2011: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2012: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2013: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2014: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2015: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2016: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2017: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2018: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2019: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2020: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2021: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2022: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2023: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2024: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0016 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2025: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0032 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2026: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0033 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2027: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0038 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2028: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0039 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2029: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003B -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2030: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003C -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2031: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003D -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2032: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0040 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2033: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0067 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2034: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006A -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2035: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006B -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2036: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009C -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2037: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009E -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2038: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A2 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2039: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCAA -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2040: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2041: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2042: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2043: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2044: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2045: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2046: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2047: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2048: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2049: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 26787 >/dev/null 2>/dev/null
selfserv with PID 26787 found at Wed May 31 23:35:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2050: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 26787 at Wed May 31 23:35:38 UTC 2017
kill -USR1 26787
selfserv: 0 cache hits; 79 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26787 killed at Wed May 31 23:35:38 UTC 2017
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed May 31 23:35:38 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:35:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28867 >/dev/null 2>/dev/null
selfserv with PID 28867 found at Wed May 31 23:35:39 UTC 2017
selfserv with PID 28867 started at Wed May 31 23:35:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2051: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 28867 >/dev/null 2>/dev/null
selfserv with PID 28867 found at Wed May 31 23:35:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2052: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 28867 >/dev/null 2>/dev/null
selfserv with PID 28867 found at Wed May 31 23:35:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2053: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 28867 >/dev/null 2>/dev/null
selfserv with PID 28867 found at Wed May 31 23:35:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2054: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 28867 >/dev/null 2>/dev/null
selfserv with PID 28867 found at Wed May 31 23:35:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2055: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 28867 at Wed May 31 23:35:40 UTC 2017
kill -USR1 28867
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28867 killed at Wed May 31 23:35:40 UTC 2017
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed May 31 23:35:40 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:35:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29005 >/dev/null 2>/dev/null
selfserv with PID 29005 found at Wed May 31 23:35:40 UTC 2017
selfserv with PID 29005 started at Wed May 31 23:35:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2056: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 29005 >/dev/null 2>/dev/null
selfserv with PID 29005 found at Wed May 31 23:35:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2057: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29005 >/dev/null 2>/dev/null
selfserv with PID 29005 found at Wed May 31 23:35:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2058: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29005 >/dev/null 2>/dev/null
selfserv with PID 29005 found at Wed May 31 23:35:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2059: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29005 >/dev/null 2>/dev/null
selfserv with PID 29005 found at Wed May 31 23:35:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2060: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 29005 >/dev/null 2>/dev/null
selfserv with PID 29005 found at Wed May 31 23:35:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2061: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 29005 >/dev/null 2>/dev/null
selfserv with PID 29005 found at Wed May 31 23:35:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2062: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29005 >/dev/null 2>/dev/null
selfserv with PID 29005 found at Wed May 31 23:35:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2063: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29005 >/dev/null 2>/dev/null
selfserv with PID 29005 found at Wed May 31 23:35:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2064: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29005 >/dev/null 2>/dev/null
selfserv with PID 29005 found at Wed May 31 23:35:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2065: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 29005 >/dev/null 2>/dev/null
selfserv with PID 29005 found at Wed May 31 23:35:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2066: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 29005 >/dev/null 2>/dev/null
selfserv with PID 29005 found at Wed May 31 23:35:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2067: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29005 >/dev/null 2>/dev/null
selfserv with PID 29005 found at Wed May 31 23:35:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2068: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29005 >/dev/null 2>/dev/null
selfserv with PID 29005 found at Wed May 31 23:35:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2069: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29005 >/dev/null 2>/dev/null
selfserv with PID 29005 found at Wed May 31 23:35:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2070: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 29005 at Wed May 31 23:35:47 UTC 2017
kill -USR1 29005
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29005 killed at Wed May 31 23:35:47 UTC 2017
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed May 31 23:35:47 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:35:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29359 >/dev/null 2>/dev/null
selfserv with PID 29359 found at Wed May 31 23:35:48 UTC 2017
selfserv with PID 29359 started at Wed May 31 23:35:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2071: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 29359 >/dev/null 2>/dev/null
selfserv with PID 29359 found at Wed May 31 23:35:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2072: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29359 >/dev/null 2>/dev/null
selfserv with PID 29359 found at Wed May 31 23:35:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2073: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29359 >/dev/null 2>/dev/null
selfserv with PID 29359 found at Wed May 31 23:35:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2074: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29359 >/dev/null 2>/dev/null
selfserv with PID 29359 found at Wed May 31 23:35:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2075: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 29359 at Wed May 31 23:35:49 UTC 2017
kill -USR1 29359
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29359 killed at Wed May 31 23:35:49 UTC 2017
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed May 31 23:35:49 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:35:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29497 >/dev/null 2>/dev/null
selfserv with PID 29497 found at Wed May 31 23:35:49 UTC 2017
selfserv with PID 29497 started at Wed May 31 23:35:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2076: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 29497 >/dev/null 2>/dev/null
selfserv with PID 29497 found at Wed May 31 23:35:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2077: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29497 >/dev/null 2>/dev/null
selfserv with PID 29497 found at Wed May 31 23:35:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2078: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29497 >/dev/null 2>/dev/null
selfserv with PID 29497 found at Wed May 31 23:35:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2079: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29497 >/dev/null 2>/dev/null
selfserv with PID 29497 found at Wed May 31 23:35:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2080: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 29497 >/dev/null 2>/dev/null
selfserv with PID 29497 found at Wed May 31 23:35:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2081: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 29497 >/dev/null 2>/dev/null
selfserv with PID 29497 found at Wed May 31 23:35:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2082: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29497 >/dev/null 2>/dev/null
selfserv with PID 29497 found at Wed May 31 23:35:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2083: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29497 >/dev/null 2>/dev/null
selfserv with PID 29497 found at Wed May 31 23:35:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2084: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29497 >/dev/null 2>/dev/null
selfserv with PID 29497 found at Wed May 31 23:35:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2085: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 29497 >/dev/null 2>/dev/null
selfserv with PID 29497 found at Wed May 31 23:35:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2086: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 29497 >/dev/null 2>/dev/null
selfserv with PID 29497 found at Wed May 31 23:35:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2087: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29497 >/dev/null 2>/dev/null
selfserv with PID 29497 found at Wed May 31 23:35:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2088: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29497 >/dev/null 2>/dev/null
selfserv with PID 29497 found at Wed May 31 23:35:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2089: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29497 >/dev/null 2>/dev/null
selfserv with PID 29497 found at Wed May 31 23:35:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2090: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 29497 at Wed May 31 23:35:56 UTC 2017
kill -USR1 29497
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29497 killed at Wed May 31 23:35:56 UTC 2017
ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed May 31 23:35:56 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:35:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29850 >/dev/null 2>/dev/null
selfserv with PID 29850 found at Wed May 31 23:35:56 UTC 2017
selfserv with PID 29850 started at Wed May 31 23:35:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2091: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 29850 >/dev/null 2>/dev/null
selfserv with PID 29850 found at Wed May 31 23:35:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2092: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29850 >/dev/null 2>/dev/null
selfserv with PID 29850 found at Wed May 31 23:35:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2093: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29850 >/dev/null 2>/dev/null
selfserv with PID 29850 found at Wed May 31 23:35:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2094: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29850 >/dev/null 2>/dev/null
selfserv with PID 29850 found at Wed May 31 23:35:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2095: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 29850 at Wed May 31 23:35:58 UTC 2017
kill -USR1 29850
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29850 killed at Wed May 31 23:35:58 UTC 2017
ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed May 31 23:35:58 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:35:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29988 >/dev/null 2>/dev/null
selfserv with PID 29988 found at Wed May 31 23:35:58 UTC 2017
selfserv with PID 29988 started at Wed May 31 23:35:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2096: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 29988 >/dev/null 2>/dev/null
selfserv with PID 29988 found at Wed May 31 23:35:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2097: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29988 >/dev/null 2>/dev/null
selfserv with PID 29988 found at Wed May 31 23:35:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2098: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29988 >/dev/null 2>/dev/null
selfserv with PID 29988 found at Wed May 31 23:35:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2099: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29988 >/dev/null 2>/dev/null
selfserv with PID 29988 found at Wed May 31 23:36:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2100: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 29988 >/dev/null 2>/dev/null
selfserv with PID 29988 found at Wed May 31 23:36:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C023 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2101: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 29988 >/dev/null 2>/dev/null
selfserv with PID 29988 found at Wed May 31 23:36:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C024 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2102: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 29988 >/dev/null 2>/dev/null
selfserv with PID 29988 found at Wed May 31 23:36:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C027 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2103: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 29988 >/dev/null 2>/dev/null
selfserv with PID 29988 found at Wed May 31 23:36:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C028 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2104: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 29988 >/dev/null 2>/dev/null
selfserv with PID 29988 found at Wed May 31 23:36:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02B -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2105: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 29988 >/dev/null 2>/dev/null
selfserv with PID 29988 found at Wed May 31 23:36:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02C -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2106: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 29988 >/dev/null 2>/dev/null
selfserv with PID 29988 found at Wed May 31 23:36:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02F -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2107: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 29988 >/dev/null 2>/dev/null
selfserv with PID 29988 found at Wed May 31 23:36:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C030 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2108: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 29988 >/dev/null 2>/dev/null
selfserv with PID 29988 found at Wed May 31 23:36:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA8 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2109: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 29988 >/dev/null 2>/dev/null
selfserv with PID 29988 found at Wed May 31 23:36:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA9 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2110: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 29988 at Wed May 31 23:36:04 UTC 2017
kill -USR1 29988
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29988 killed at Wed May 31 23:36:04 UTC 2017
ssl.sh: SSL Client Authentication Extended Test - server bypass/client normal - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed May 31 23:36:04 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30389 >/dev/null 2>/dev/null
selfserv with PID 30389 found at Wed May 31 23:36:04 UTC 2017
selfserv with PID 30389 started at Wed May 31 23:36:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2111: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30389 at Wed May 31 23:36:05 UTC 2017
kill -USR1 30389
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30389 killed at Wed May 31 23:36:05 UTC 2017
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Wed May 31 23:36:05 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30446 >/dev/null 2>/dev/null
selfserv with PID 30446 found at Wed May 31 23:36:05 UTC 2017
selfserv with PID 30446 started at Wed May 31 23:36:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w bogus -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2112: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30446 at Wed May 31 23:36:06 UTC 2017
kill -USR1 30446
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30446 killed at Wed May 31 23:36:06 UTC 2017
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Wed May 31 23:36:06 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30503 >/dev/null 2>/dev/null
selfserv with PID 30503 found at Wed May 31 23:36:06 UTC 2017
selfserv with PID 30503 started at Wed May 31 23:36:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w nss -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2113: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30503 at Wed May 31 23:36:08 UTC 2017
kill -USR1 30503
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30503 killed at Wed May 31 23:36:08 UTC 2017
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Wed May 31 23:36:08 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30560 >/dev/null 2>/dev/null
selfserv with PID 30560 found at Wed May 31 23:36:08 UTC 2017
selfserv with PID 30560 started at Wed May 31 23:36:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2114: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 30560 at Wed May 31 23:36:09 UTC 2017
kill -USR1 30560
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30560 killed at Wed May 31 23:36:09 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Wed May 31 23:36:09 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30617 >/dev/null 2>/dev/null
selfserv with PID 30617 found at Wed May 31 23:36:09 UTC 2017
selfserv with PID 30617 started at Wed May 31 23:36:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w bogus -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2115: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 30617 at Wed May 31 23:36:10 UTC 2017
kill -USR1 30617
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30617 killed at Wed May 31 23:36:10 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed May 31 23:36:10 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30674 >/dev/null 2>/dev/null
selfserv with PID 30674 found at Wed May 31 23:36:10 UTC 2017
selfserv with PID 30674 started at Wed May 31 23:36:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w nss -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2116: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30674 at Wed May 31 23:36:11 UTC 2017
kill -USR1 30674
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30674 killed at Wed May 31 23:36:11 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed May 31 23:36:11 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30731 >/dev/null 2>/dev/null
selfserv with PID 30731 found at Wed May 31 23:36:11 UTC 2017
selfserv with PID 30731 started at Wed May 31 23:36:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2117: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30731 at Wed May 31 23:36:13 UTC 2017
kill -USR1 30731
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30731 killed at Wed May 31 23:36:13 UTC 2017
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Wed May 31 23:36:13 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30788 >/dev/null 2>/dev/null
selfserv with PID 30788 found at Wed May 31 23:36:13 UTC 2017
selfserv with PID 30788 started at Wed May 31 23:36:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2118: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30788 at Wed May 31 23:36:14 UTC 2017
kill -USR1 30788
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30788 killed at Wed May 31 23:36:14 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Wed May 31 23:36:14 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30845 >/dev/null 2>/dev/null
selfserv with PID 30845 found at Wed May 31 23:36:14 UTC 2017
selfserv with PID 30845 started at Wed May 31 23:36:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2119: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 30845 at Wed May 31 23:36:15 UTC 2017
kill -USR1 30845
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30845 killed at Wed May 31 23:36:15 UTC 2017
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Wed May 31 23:36:15 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30902 >/dev/null 2>/dev/null
selfserv with PID 30902 found at Wed May 31 23:36:15 UTC 2017
selfserv with PID 30902 started at Wed May 31 23:36:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2120: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 30902 at Wed May 31 23:36:16 UTC 2017
kill -USR1 30902
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30902 killed at Wed May 31 23:36:16 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Wed May 31 23:36:16 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30960 >/dev/null 2>/dev/null
selfserv with PID 30960 found at Wed May 31 23:36:16 UTC 2017
selfserv with PID 30960 started at Wed May 31 23:36:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2121: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 30960 at Wed May 31 23:36:17 UTC 2017
kill -USR1 30960
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30960 killed at Wed May 31 23:36:17 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed May 31 23:36:17 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31017 >/dev/null 2>/dev/null
selfserv with PID 31017 found at Wed May 31 23:36:17 UTC 2017
selfserv with PID 31017 started at Wed May 31 23:36:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2122: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31017 at Wed May 31 23:36:18 UTC 2017
kill -USR1 31017
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31017 killed at Wed May 31 23:36:18 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:36:18 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31074 >/dev/null 2>/dev/null
selfserv with PID 31074 found at Wed May 31 23:36:19 UTC 2017
selfserv with PID 31074 started at Wed May 31 23:36:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2123: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31074 at Wed May 31 23:36:20 UTC 2017
kill -USR1 31074
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31074 killed at Wed May 31 23:36:20 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:36:20 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31131 >/dev/null 2>/dev/null
selfserv with PID 31131 found at Wed May 31 23:36:20 UTC 2017
selfserv with PID 31131 started at Wed May 31 23:36:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w bogus -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2124: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31131 at Wed May 31 23:36:21 UTC 2017
kill -USR1 31131
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31131 killed at Wed May 31 23:36:21 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:36:22 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31188 >/dev/null 2>/dev/null
selfserv with PID 31188 found at Wed May 31 23:36:22 UTC 2017
selfserv with PID 31188 started at Wed May 31 23:36:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w nss -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2125: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31188 at Wed May 31 23:36:23 UTC 2017
kill -USR1 31188
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31188 killed at Wed May 31 23:36:23 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:36:23 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31245 >/dev/null 2>/dev/null
selfserv with PID 31245 found at Wed May 31 23:36:23 UTC 2017
selfserv with PID 31245 started at Wed May 31 23:36:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2126: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31245 at Wed May 31 23:36:24 UTC 2017
kill -USR1 31245
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31245 killed at Wed May 31 23:36:24 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:36:25 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31302 >/dev/null 2>/dev/null
selfserv with PID 31302 found at Wed May 31 23:36:25 UTC 2017
selfserv with PID 31302 started at Wed May 31 23:36:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w bogus -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2127: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31302 at Wed May 31 23:36:26 UTC 2017
kill -USR1 31302
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31302 killed at Wed May 31 23:36:26 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:36:26 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31359 >/dev/null 2>/dev/null
selfserv with PID 31359 found at Wed May 31 23:36:26 UTC 2017
selfserv with PID 31359 started at Wed May 31 23:36:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w nss -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2128: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31359 at Wed May 31 23:36:28 UTC 2017
kill -USR1 31359
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31359 killed at Wed May 31 23:36:28 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:36:28 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31416 >/dev/null 2>/dev/null
selfserv with PID 31416 found at Wed May 31 23:36:28 UTC 2017
selfserv with PID 31416 started at Wed May 31 23:36:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.0 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2129: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31416 at Wed May 31 23:36:29 UTC 2017
kill -USR1 31416
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31416 killed at Wed May 31 23:36:29 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:36:29 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31473 >/dev/null 2>/dev/null
selfserv with PID 31473 found at Wed May 31 23:36:29 UTC 2017
selfserv with PID 31473 started at Wed May 31 23:36:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2130: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31473 at Wed May 31 23:36:31 UTC 2017
kill -USR1 31473
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31473 killed at Wed May 31 23:36:31 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:36:31 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31531 >/dev/null 2>/dev/null
selfserv with PID 31531 found at Wed May 31 23:36:31 UTC 2017
selfserv with PID 31531 started at Wed May 31 23:36:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2131: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31531 at Wed May 31 23:36:33 UTC 2017
kill -USR1 31531
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31531 killed at Wed May 31 23:36:33 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:36:33 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31588 >/dev/null 2>/dev/null
selfserv with PID 31588 found at Wed May 31 23:36:33 UTC 2017
selfserv with PID 31588 started at Wed May 31 23:36:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.0 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2132: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31588 at Wed May 31 23:36:34 UTC 2017
kill -USR1 31588
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31588 killed at Wed May 31 23:36:34 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:36:34 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31645 >/dev/null 2>/dev/null
selfserv with PID 31645 found at Wed May 31 23:36:34 UTC 2017
selfserv with PID 31645 started at Wed May 31 23:36:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2133: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31645 at Wed May 31 23:36:36 UTC 2017
kill -USR1 31645
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31645 killed at Wed May 31 23:36:36 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:36:36 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31702 >/dev/null 2>/dev/null
selfserv with PID 31702 found at Wed May 31 23:36:36 UTC 2017
selfserv with PID 31702 started at Wed May 31 23:36:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2134: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31702 at Wed May 31 23:36:37 UTC 2017
kill -USR1 31702
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31702 killed at Wed May 31 23:36:37 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:36:37 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31760 >/dev/null 2>/dev/null
selfserv with PID 31760 found at Wed May 31 23:36:37 UTC 2017
selfserv with PID 31760 started at Wed May 31 23:36:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2135: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31760 at Wed May 31 23:36:38 UTC 2017
kill -USR1 31760
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31760 killed at Wed May 31 23:36:38 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:36:39 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31817 >/dev/null 2>/dev/null
selfserv with PID 31817 found at Wed May 31 23:36:39 UTC 2017
selfserv with PID 31817 started at Wed May 31 23:36:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2136: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31817 at Wed May 31 23:36:40 UTC 2017
kill -USR1 31817
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31817 killed at Wed May 31 23:36:40 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:36:40 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31874 >/dev/null 2>/dev/null
selfserv with PID 31874 found at Wed May 31 23:36:40 UTC 2017
selfserv with PID 31874 started at Wed May 31 23:36:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2137: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31874 at Wed May 31 23:36:41 UTC 2017
kill -USR1 31874
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31874 killed at Wed May 31 23:36:41 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:36:41 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31931 >/dev/null 2>/dev/null
selfserv with PID 31931 found at Wed May 31 23:36:41 UTC 2017
selfserv with PID 31931 started at Wed May 31 23:36:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2138: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31931 at Wed May 31 23:36:43 UTC 2017
kill -USR1 31931
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31931 killed at Wed May 31 23:36:43 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:36:43 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31988 >/dev/null 2>/dev/null
selfserv with PID 31988 found at Wed May 31 23:36:43 UTC 2017
selfserv with PID 31988 started at Wed May 31 23:36:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2139: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 31988 at Wed May 31 23:36:44 UTC 2017
kill -USR1 31988
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31988 killed at Wed May 31 23:36:44 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:36:44 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32045 >/dev/null 2>/dev/null
selfserv with PID 32045 found at Wed May 31 23:36:44 UTC 2017
selfserv with PID 32045 started at Wed May 31 23:36:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2140: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32045 at Wed May 31 23:36:45 UTC 2017
kill -USR1 32045
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32045 killed at Wed May 31 23:36:45 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed May 31 23:36:46 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32117 >/dev/null 2>/dev/null
selfserv with PID 32117 found at Wed May 31 23:36:46 UTC 2017
selfserv with PID 32117 started at Wed May 31 23:36:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2141: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32117 at Wed May 31 23:36:47 UTC 2017
kill -USR1 32117
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32117 killed at Wed May 31 23:36:47 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed May 31 23:36:47 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32174 >/dev/null 2>/dev/null
selfserv with PID 32174 found at Wed May 31 23:36:47 UTC 2017
selfserv with PID 32174 started at Wed May 31 23:36:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2142: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32174 at Wed May 31 23:36:48 UTC 2017
kill -USR1 32174
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32174 killed at Wed May 31 23:36:48 UTC 2017
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Wed May 31 23:36:48 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32231 >/dev/null 2>/dev/null
selfserv with PID 32231 found at Wed May 31 23:36:48 UTC 2017
selfserv with PID 32231 started at Wed May 31 23:36:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2143: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32231 at Wed May 31 23:36:49 UTC 2017
kill -USR1 32231
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32231 killed at Wed May 31 23:36:49 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed May 31 23:36:49 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32288 >/dev/null 2>/dev/null
selfserv with PID 32288 found at Wed May 31 23:36:50 UTC 2017
selfserv with PID 32288 started at Wed May 31 23:36:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2144: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32288 at Wed May 31 23:36:51 UTC 2017
kill -USR1 32288
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32288 killed at Wed May 31 23:36:51 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed May 31 23:36:51 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32345 >/dev/null 2>/dev/null
selfserv with PID 32345 found at Wed May 31 23:36:51 UTC 2017
selfserv with PID 32345 started at Wed May 31 23:36:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2145: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32345 at Wed May 31 23:36:52 UTC 2017
kill -USR1 32345
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32345 killed at Wed May 31 23:36:52 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed May 31 23:36:52 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32402 >/dev/null 2>/dev/null
selfserv with PID 32402 found at Wed May 31 23:36:52 UTC 2017
selfserv with PID 32402 started at Wed May 31 23:36:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2146: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32402 at Wed May 31 23:36:53 UTC 2017
kill -USR1 32402
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32402 killed at Wed May 31 23:36:53 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Wed May 31 23:36:54 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32459 >/dev/null 2>/dev/null
selfserv with PID 32459 found at Wed May 31 23:36:54 UTC 2017
selfserv with PID 32459 started at Wed May 31 23:36:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2147: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32459 at Wed May 31 23:36:55 UTC 2017
kill -USR1 32459
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32459 killed at Wed May 31 23:36:55 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed May 31 23:36:55 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32516 >/dev/null 2>/dev/null
selfserv with PID 32516 found at Wed May 31 23:36:55 UTC 2017
selfserv with PID 32516 started at Wed May 31 23:36:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2148: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32516 at Wed May 31 23:36:56 UTC 2017
kill -USR1 32516
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32516 killed at Wed May 31 23:36:56 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:36:56 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32573 >/dev/null 2>/dev/null
selfserv with PID 32573 found at Wed May 31 23:36:56 UTC 2017
selfserv with PID 32573 started at Wed May 31 23:36:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2149: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32573 at Wed May 31 23:36:58 UTC 2017
kill -USR1 32573
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32573 killed at Wed May 31 23:36:58 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:36:58 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32630 >/dev/null 2>/dev/null
selfserv with PID 32630 found at Wed May 31 23:36:58 UTC 2017
selfserv with PID 32630 started at Wed May 31 23:36:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2150: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32630 at Wed May 31 23:36:59 UTC 2017
kill -USR1 32630
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32630 killed at Wed May 31 23:36:59 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:36:59 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:36:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32687 >/dev/null 2>/dev/null
selfserv with PID 32687 found at Wed May 31 23:37:00 UTC 2017
selfserv with PID 32687 started at Wed May 31 23:37:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2151: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32687 at Wed May 31 23:37:01 UTC 2017
kill -USR1 32687
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32687 killed at Wed May 31 23:37:01 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:37:01 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:37:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32744 >/dev/null 2>/dev/null
selfserv with PID 32744 found at Wed May 31 23:37:01 UTC 2017
selfserv with PID 32744 started at Wed May 31 23:37:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2152: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32744 at Wed May 31 23:37:03 UTC 2017
kill -USR1 32744
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32744 killed at Wed May 31 23:37:03 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:37:03 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:37:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 334 >/dev/null 2>/dev/null
selfserv with PID 334 found at Wed May 31 23:37:03 UTC 2017
selfserv with PID 334 started at Wed May 31 23:37:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2153: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 334 at Wed May 31 23:37:04 UTC 2017
kill -USR1 334
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 334 killed at Wed May 31 23:37:04 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:37:04 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:37:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 394 >/dev/null 2>/dev/null
selfserv with PID 394 found at Wed May 31 23:37:04 UTC 2017
selfserv with PID 394 started at Wed May 31 23:37:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2154: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 394 at Wed May 31 23:37:06 UTC 2017
kill -USR1 394
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 394 killed at Wed May 31 23:37:06 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:37:06 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:37:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 453 >/dev/null 2>/dev/null
selfserv with PID 453 found at Wed May 31 23:37:06 UTC 2017
selfserv with PID 453 started at Wed May 31 23:37:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2155: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 453 at Wed May 31 23:37:08 UTC 2017
kill -USR1 453
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 453 killed at Wed May 31 23:37:08 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:37:08 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:37:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 512 >/dev/null 2>/dev/null
selfserv with PID 512 found at Wed May 31 23:37:08 UTC 2017
selfserv with PID 512 started at Wed May 31 23:37:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2156: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 512 at Wed May 31 23:37:09 UTC 2017
kill -USR1 512
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 512 killed at Wed May 31 23:37:09 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:37:09 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:37:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 574 >/dev/null 2>/dev/null
selfserv with PID 574 found at Wed May 31 23:37:10 UTC 2017
selfserv with PID 574 started at Wed May 31 23:37:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2157: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 574 at Wed May 31 23:37:11 UTC 2017
kill -USR1 574
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 574 killed at Wed May 31 23:37:11 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:37:11 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:37:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 631 >/dev/null 2>/dev/null
selfserv with PID 631 found at Wed May 31 23:37:11 UTC 2017
selfserv with PID 631 started at Wed May 31 23:37:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2158: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 631 at Wed May 31 23:37:12 UTC 2017
kill -USR1 631
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 631 killed at Wed May 31 23:37:12 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:37:12 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:37:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 689 >/dev/null 2>/dev/null
selfserv with PID 689 found at Wed May 31 23:37:12 UTC 2017
selfserv with PID 689 started at Wed May 31 23:37:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2159: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 689 at Wed May 31 23:37:13 UTC 2017
kill -USR1 689
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 689 killed at Wed May 31 23:37:13 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:37:14 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:37:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 746 >/dev/null 2>/dev/null
selfserv with PID 746 found at Wed May 31 23:37:14 UTC 2017
selfserv with PID 746 started at Wed May 31 23:37:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2160: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 746 at Wed May 31 23:37:15 UTC 2017
kill -USR1 746
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 746 killed at Wed May 31 23:37:15 UTC 2017
ssl.sh: skipping TLS Server hello response without SNI for Extended Test
ssl.sh: skipping TLS Server hello response with SNI for Extended Test
ssl.sh: skipping TLS Server response with alert for Extended Test
ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping TLS Server hello response without SNI for Extended Test
ssl.sh: skipping TLS Server hello response with SNI for Extended Test
ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping TLS Server response with alert for Extended Test
./ssl.sh: line 1071: [: -nz: unary operator expected
ssl.sh: SSL Stress Test Extended Test - server bypass/client normal - with ECC ===============================
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Wed May 31 23:37:16 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:37:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 893 >/dev/null 2>/dev/null
selfserv with PID 893 found at Wed May 31 23:37:16 UTC 2017
selfserv with PID 893 started at Wed May 31 23:37:16 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -c 1000 -C c -V ssl3:ssl3 \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:37:16 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:37:18 UTC 2017
ssl.sh: #2161: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 893 at Wed May 31 23:37:18 UTC 2017
kill -USR1 893
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 893 killed at Wed May 31 23:37:18 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 ----
selfserv starting at Wed May 31 23:37:18 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:37:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 968 >/dev/null 2>/dev/null
selfserv with PID 968 found at Wed May 31 23:37:18 UTC 2017
selfserv with PID 968 started at Wed May 31 23:37:18 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -c 1000 -C c \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:37:18 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:37:20 UTC 2017
ssl.sh: #2162: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 968 at Wed May 31 23:37:20 UTC 2017
kill -USR1 968
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 968 killed at Wed May 31 23:37:20 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (false start) ----
selfserv starting at Wed May 31 23:37:20 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:37:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1042 >/dev/null 2>/dev/null
selfserv with PID 1042 found at Wed May 31 23:37:20 UTC 2017
selfserv with PID 1042 started at Wed May 31 23:37:20 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -c 1000 -C c -g \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:37:20 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:37:22 UTC 2017
ssl.sh: #2163: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 1042 at Wed May 31 23:37:22 UTC 2017
kill -USR1 1042
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1042 killed at Wed May 31 23:37:22 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ----
selfserv starting at Wed May 31 23:37:23 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:37:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1116 >/dev/null 2>/dev/null
selfserv with PID 1116 found at Wed May 31 23:37:23 UTC 2017
selfserv with PID 1116 started at Wed May 31 23:37:23 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C c -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:37:23 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Wed May 31 23:37:25 UTC 2017
ssl.sh: #2164: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 1116 at Wed May 31 23:37:25 UTC 2017
kill -USR1 1116
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1116 killed at Wed May 31 23:37:25 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression) ----
selfserv starting at Wed May 31 23:37:25 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:37:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1190 >/dev/null 2>/dev/null
selfserv with PID 1190 found at Wed May 31 23:37:25 UTC 2017
selfserv with PID 1190 started at Wed May 31 23:37:25 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C c -z \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:37:25 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:37:27 UTC 2017
ssl.sh: #2165: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 1190 at Wed May 31 23:37:27 UTC 2017
kill -USR1 1190
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1190 killed at Wed May 31 23:37:27 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Wed May 31 23:37:28 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:37:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1264 >/dev/null 2>/dev/null
selfserv with PID 1264 found at Wed May 31 23:37:28 UTC 2017
selfserv with PID 1264 started at Wed May 31 23:37:28 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:37:28 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Wed May 31 23:37:30 UTC 2017
ssl.sh: #2166: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 1264 at Wed May 31 23:37:30 UTC 2017
kill -USR1 1264
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1264 killed at Wed May 31 23:37:30 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Wed May 31 23:37:30 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:37:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1338 >/dev/null 2>/dev/null
selfserv with PID 1338 found at Wed May 31 23:37:30 UTC 2017
selfserv with PID 1338 started at Wed May 31 23:37:30 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z -g \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:37:30 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Wed May 31 23:37:33 UTC 2017
ssl.sh: #2167: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 1338 at Wed May 31 23:37:33 UTC 2017
kill -USR1 1338
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1338 killed at Wed May 31 23:37:33 UTC 2017
ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed May 31 23:37:33 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:37:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1429 >/dev/null 2>/dev/null
selfserv with PID 1429 found at Wed May 31 23:37:33 UTC 2017
selfserv with PID 1429 started at Wed May 31 23:37:33 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -c 100 -C c -V ssl3:ssl3 -N -n ExtendedSSLUser \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:37:33 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:37:38 UTC 2017
ssl.sh: #2168: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 1429 at Wed May 31 23:37:38 UTC 2017
kill -USR1 1429
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1429 killed at Wed May 31 23:37:38 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed May 31 23:37:38 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:37:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1502 >/dev/null 2>/dev/null
selfserv with PID 1502 found at Wed May 31 23:37:39 UTC 2017
selfserv with PID 1502 started at Wed May 31 23:37:39 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -c 100 -C c -N -n ExtendedSSLUser \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:37:39 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:37:44 UTC 2017
ssl.sh: #2169: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 1502 at Wed May 31 23:37:44 UTC 2017
kill -USR1 1502
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1502 killed at Wed May 31 23:37:44 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Wed May 31 23:37:44 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:37:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1575 >/dev/null 2>/dev/null
selfserv with PID 1575 found at Wed May 31 23:37:44 UTC 2017
selfserv with PID 1575 started at Wed May 31 23:37:44 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:37:44 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Wed May 31 23:37:45 UTC 2017
ssl.sh: #2170: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 1575 at Wed May 31 23:37:45 UTC 2017
kill -USR1 1575
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1575 killed at Wed May 31 23:37:45 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Wed May 31 23:37:45 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:37:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1649 >/dev/null 2>/dev/null
selfserv with PID 1649 found at Wed May 31 23:37:45 UTC 2017
selfserv with PID 1649 started at Wed May 31 23:37:45 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -z \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:37:45 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:37:46 UTC 2017
ssl.sh: #2171: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 1649 at Wed May 31 23:37:46 UTC 2017
kill -USR1 1649
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1649 killed at Wed May 31 23:37:46 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Wed May 31 23:37:47 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:37:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1723 >/dev/null 2>/dev/null
selfserv with PID 1723 found at Wed May 31 23:37:47 UTC 2017
selfserv with PID 1723 started at Wed May 31 23:37:47 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -z -g \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:37:47 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:37:48 UTC 2017
ssl.sh: #2172: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 1723 at Wed May 31 23:37:48 UTC 2017
kill -USR1 1723
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1723 killed at Wed May 31 23:37:48 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Wed May 31 23:37:48 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:37:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1797 >/dev/null 2>/dev/null
selfserv with PID 1797 found at Wed May 31 23:37:48 UTC 2017
selfserv with PID 1797 started at Wed May 31 23:37:48 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u -z \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:37:48 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Wed May 31 23:37:49 UTC 2017
ssl.sh: #2173: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 1797 at Wed May 31 23:37:49 UTC 2017
kill -USR1 1797
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1797 killed at Wed May 31 23:37:49 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Wed May 31 23:37:49 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:37:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1871 >/dev/null 2>/dev/null
selfserv with PID 1871 found at Wed May 31 23:37:49 UTC 2017
selfserv with PID 1871 started at Wed May 31 23:37:49 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u -z -g \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:37:50 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Wed May 31 23:37:51 UTC 2017
ssl.sh: #2174: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 1871 at Wed May 31 23:37:51 UTC 2017
kill -USR1 1871
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1871 killed at Wed May 31 23:37:51 UTC 2017
ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed May 31 23:37:51 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:37:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1964 >/dev/null 2>/dev/null
selfserv with PID 1964 found at Wed May 31 23:37:51 UTC 2017
selfserv with PID 1964 started at Wed May 31 23:37:51 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C009 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:37:51 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:38:03 UTC 2017
ssl.sh: #2175: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 1964 at Wed May 31 23:38:03 UTC 2017
kill -USR1 1964
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1964 killed at Wed May 31 23:38:03 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ----
selfserv starting at Wed May 31 23:38:03 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C023 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:38:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2158 >/dev/null 2>/dev/null
selfserv with PID 2158 found at Wed May 31 23:38:03 UTC 2017
selfserv with PID 2158 started at Wed May 31 23:38:03 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C023 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:38:03 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:38:15 UTC 2017
ssl.sh: #2176: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 2158 at Wed May 31 23:38:15 UTC 2017
kill -USR1 2158
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2158 killed at Wed May 31 23:38:15 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ----
selfserv starting at Wed May 31 23:38:16 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02B -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:38:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2441 >/dev/null 2>/dev/null
selfserv with PID 2441 found at Wed May 31 23:38:16 UTC 2017
selfserv with PID 2441 started at Wed May 31 23:38:16 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C02B -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:38:16 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:38:27 UTC 2017
ssl.sh: #2177: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 2441 at Wed May 31 23:38:27 UTC 2017
kill -USR1 2441
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2441 killed at Wed May 31 23:38:27 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed May 31 23:38:27 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:38:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2518 >/dev/null 2>/dev/null
selfserv with PID 2518 found at Wed May 31 23:38:27 UTC 2017
selfserv with PID 2518 started at Wed May 31 23:38:27 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C004 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:38:27 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:38:38 UTC 2017
ssl.sh: #2178: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 2518 at Wed May 31 23:38:39 UTC 2017
kill -USR1 2518
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2518 killed at Wed May 31 23:38:39 UTC 2017
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed May 31 23:38:39 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C00E -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:38:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2593 >/dev/null 2>/dev/null
selfserv with PID 2593 found at Wed May 31 23:38:39 UTC 2017
selfserv with PID 2593 started at Wed May 31 23:38:39 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C00E -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:38:39 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:38:41 UTC 2017
ssl.sh: #2179: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 2593 at Wed May 31 23:38:41 UTC 2017
kill -USR1 2593
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2593 killed at Wed May 31 23:38:41 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ----
selfserv starting at Wed May 31 23:38:41 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C013 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:38:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2667 >/dev/null 2>/dev/null
selfserv with PID 2667 found at Wed May 31 23:38:41 UTC 2017
selfserv with PID 2667 started at Wed May 31 23:38:41 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :C013 \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:38:41 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:38:43 UTC 2017
ssl.sh: #2180: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 2667 at Wed May 31 23:38:44 UTC 2017
kill -USR1 2667
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2667 killed at Wed May 31 23:38:44 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ----
selfserv starting at Wed May 31 23:38:44 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C027 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:38:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2741 >/dev/null 2>/dev/null
selfserv with PID 2741 found at Wed May 31 23:38:44 UTC 2017
selfserv with PID 2741 started at Wed May 31 23:38:44 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :C027 \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:38:44 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:38:46 UTC 2017
ssl.sh: #2181: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 2741 at Wed May 31 23:38:46 UTC 2017
kill -USR1 2741
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2741 killed at Wed May 31 23:38:46 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ----
selfserv starting at Wed May 31 23:38:46 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02F -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:38:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2817 >/dev/null 2>/dev/null
selfserv with PID 2817 found at Wed May 31 23:38:46 UTC 2017
selfserv with PID 2817 started at Wed May 31 23:38:46 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :C02F \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:38:46 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:38:48 UTC 2017
ssl.sh: #2182: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 2817 at Wed May 31 23:38:48 UTC 2017
kill -USR1 2817
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2817 killed at Wed May 31 23:38:48 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ----
selfserv starting at Wed May 31 23:38:49 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:38:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2893 >/dev/null 2>/dev/null
selfserv with PID 2893 found at Wed May 31 23:38:49 UTC 2017
selfserv with PID 2893 started at Wed May 31 23:38:49 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :C004 -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:38:49 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Wed May 31 23:38:51 UTC 2017
ssl.sh: #2183: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 2893 at Wed May 31 23:38:51 UTC 2017
kill -USR1 2893
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2893 killed at Wed May 31 23:38:51 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ----
selfserv starting at Wed May 31 23:38:51 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:38:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2967 >/dev/null 2>/dev/null
selfserv with PID 2967 found at Wed May 31 23:38:51 UTC 2017
selfserv with PID 2967 started at Wed May 31 23:38:51 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C009 -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:38:51 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Wed May 31 23:38:52 UTC 2017
ssl.sh: #2184: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 2967 at Wed May 31 23:38:52 UTC 2017
kill -USR1 2967
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2967 killed at Wed May 31 23:38:52 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed May 31 23:38:53 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C009 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:38:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3056 >/dev/null 2>/dev/null
selfserv with PID 3056 found at Wed May 31 23:38:53 UTC 2017
selfserv with PID 3056 started at Wed May 31 23:38:53 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 10 -C :C009 -N -n ExtendedSSLUser-ec \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:38:53 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed May 31 23:38:56 UTC 2017
ssl.sh: #2185: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 3056 at Wed May 31 23:38:56 UTC 2017
kill -USR1 3056
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3056 killed at Wed May 31 23:38:56 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Wed May 31 23:38:56 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:38:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3129 >/dev/null 2>/dev/null
selfserv with PID 3129 found at Wed May 31 23:38:56 UTC 2017
selfserv with PID 3129 started at Wed May 31 23:38:56 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:38:56 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:38:57 UTC 2017
ssl.sh: #2186: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 3129 at Wed May 31 23:38:58 UTC 2017
kill -USR1 3129
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3129 killed at Wed May 31 23:38:58 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed May 31 23:38:58 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C004 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:38:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3203 >/dev/null 2>/dev/null
selfserv with PID 3203 found at Wed May 31 23:38:58 UTC 2017
selfserv with PID 3203 started at Wed May 31 23:38:58 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:38:58 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed May 31 23:39:01 UTC 2017
ssl.sh: #2187: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 3203 at Wed May 31 23:39:01 UTC 2017
kill -USR1 3203
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3203 killed at Wed May 31 23:39:01 UTC 2017
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed May 31 23:39:01 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -r -r -c :C00E -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:39:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3276 >/dev/null 2>/dev/null
selfserv with PID 3276 found at Wed May 31 23:39:01 UTC 2017
selfserv with PID 3276 started at Wed May 31 23:39:01 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:39:01 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed May 31 23:39:02 UTC 2017
ssl.sh: #2188: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 3276 at Wed May 31 23:39:02 UTC 2017
kill -USR1 3276
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3276 killed at Wed May 31 23:39:02 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Wed May 31 23:39:02 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:39:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3350 >/dev/null 2>/dev/null
selfserv with PID 3350 found at Wed May 31 23:39:02 UTC 2017
selfserv with PID 3350 started at Wed May 31 23:39:02 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:39:02 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:39:04 UTC 2017
ssl.sh: #2189: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 3350 at Wed May 31 23:39:04 UTC 2017
kill -USR1 3350
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3350 killed at Wed May 31 23:39:04 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Wed May 31 23:39:04 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:39:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3424 >/dev/null 2>/dev/null
selfserv with PID 3424 found at Wed May 31 23:39:04 UTC 2017
selfserv with PID 3424 started at Wed May 31 23:39:04 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:39:04 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Wed May 31 23:39:05 UTC 2017
ssl.sh: #2190: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 3424 at Wed May 31 23:39:05 UTC 2017
kill -USR1 3424
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3424 killed at Wed May 31 23:39:05 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ----
selfserv starting at Wed May 31 23:39:06 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0016 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:39:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3515 >/dev/null 2>/dev/null
selfserv with PID 3515 found at Wed May 31 23:39:06 UTC 2017
selfserv with PID 3515 started at Wed May 31 23:39:06 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :0016 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:39:06 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:39:12 UTC 2017
ssl.sh: #2191: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 3515 at Wed May 31 23:39:12 UTC 2017
kill -USR1 3515
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3515 killed at Wed May 31 23:39:12 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ----
selfserv starting at Wed May 31 23:39:12 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0033 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:39:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3589 >/dev/null 2>/dev/null
selfserv with PID 3589 found at Wed May 31 23:39:12 UTC 2017
selfserv with PID 3589 started at Wed May 31 23:39:12 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :0033 \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:39:12 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:39:14 UTC 2017
ssl.sh: #2192: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 3589 at Wed May 31 23:39:14 UTC 2017
kill -USR1 3589
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3589 killed at Wed May 31 23:39:14 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Wed May 31 23:39:14 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0039 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:39:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3663 >/dev/null 2>/dev/null
selfserv with PID 3663 found at Wed May 31 23:39:14 UTC 2017
selfserv with PID 3663 started at Wed May 31 23:39:14 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :0039 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:39:14 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:39:20 UTC 2017
ssl.sh: #2193: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 3663 at Wed May 31 23:39:21 UTC 2017
kill -USR1 3663
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3663 killed at Wed May 31 23:39:21 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ----
selfserv starting at Wed May 31 23:39:21 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0040 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:39:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3736 >/dev/null 2>/dev/null
selfserv with PID 3736 found at Wed May 31 23:39:21 UTC 2017
selfserv with PID 3736 started at Wed May 31 23:39:21 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :0040 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:39:21 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:39:31 UTC 2017
ssl.sh: #2194: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 3736 at Wed May 31 23:39:31 UTC 2017
kill -USR1 3736
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3736 killed at Wed May 31 23:39:31 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Wed May 31 23:39:31 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0038 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:39:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3820 >/dev/null 2>/dev/null
selfserv with PID 3820 found at Wed May 31 23:39:31 UTC 2017
selfserv with PID 3820 started at Wed May 31 23:39:31 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :0038 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:39:31 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Wed May 31 23:41:03 UTC 2017
ssl.sh: #2195: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 3820 at Wed May 31 23:41:03 UTC 2017
kill -USR1 3820
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3820 killed at Wed May 31 23:41:03 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ----
selfserv starting at Wed May 31 23:41:04 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006A -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:41:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4258 >/dev/null 2>/dev/null
selfserv with PID 4258 found at Wed May 31 23:41:04 UTC 2017
selfserv with PID 4258 started at Wed May 31 23:41:04 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :006A -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:41:04 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Wed May 31 23:42:33 UTC 2017
ssl.sh: #2196: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 4258 at Wed May 31 23:42:33 UTC 2017
kill -USR1 4258
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4258 killed at Wed May 31 23:42:33 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ----
selfserv starting at Wed May 31 23:42:33 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006B -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:42:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4332 >/dev/null 2>/dev/null
selfserv with PID 4332 found at Wed May 31 23:42:33 UTC 2017
selfserv with PID 4332 started at Wed May 31 23:42:33 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :006B -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:42:33 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:42:39 UTC 2017
ssl.sh: #2197: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 4332 at Wed May 31 23:42:39 UTC 2017
kill -USR1 4332
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4332 killed at Wed May 31 23:42:39 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ----
selfserv starting at Wed May 31 23:42:40 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009E -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:42:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4405 >/dev/null 2>/dev/null
selfserv with PID 4405 found at Wed May 31 23:42:40 UTC 2017
selfserv with PID 4405 started at Wed May 31 23:42:40 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :009E -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:42:40 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:42:46 UTC 2017
ssl.sh: #2198: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 4405 at Wed May 31 23:42:46 UTC 2017
kill -USR1 4405
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4405 killed at Wed May 31 23:42:46 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) ----
selfserv starting at Wed May 31 23:42:46 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009F -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:42:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4478 >/dev/null 2>/dev/null
selfserv with PID 4478 found at Wed May 31 23:42:46 UTC 2017
selfserv with PID 4478 started at Wed May 31 23:42:46 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :009F -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:42:46 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:42:52 UTC 2017
ssl.sh: #2199: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 4478 at Wed May 31 23:42:52 UTC 2017
kill -USR1 4478
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4478 killed at Wed May 31 23:42:52 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ----
selfserv starting at Wed May 31 23:42:52 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0032 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:42:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4566 >/dev/null 2>/dev/null
selfserv with PID 4566 found at Wed May 31 23:42:52 UTC 2017
selfserv with PID 4566 started at Wed May 31 23:42:52 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:42:52 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:43:09 UTC 2017
ssl.sh: #2200: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 4566 at Wed May 31 23:43:09 UTC 2017
kill -USR1 4566
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4566 killed at Wed May 31 23:43:09 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ----
selfserv starting at Wed May 31 23:43:09 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0067 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:43:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4841 >/dev/null 2>/dev/null
selfserv with PID 4841 found at Wed May 31 23:43:09 UTC 2017
selfserv with PID 4841 started at Wed May 31 23:43:09 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:43:09 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:43:12 UTC 2017
ssl.sh: #2201: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 4841 at Wed May 31 23:43:12 UTC 2017
kill -USR1 4841
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4841 killed at Wed May 31 23:43:12 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ----
selfserv starting at Wed May 31 23:43:12 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:43:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5022 >/dev/null 2>/dev/null
selfserv with PID 5022 found at Wed May 31 23:43:12 UTC 2017
selfserv with PID 5022 started at Wed May 31 23:43:12 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:43:12 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Wed May 31 23:45:45 UTC 2017
ssl.sh: #2202: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5022 at Wed May 31 23:45:45 UTC 2017
kill -USR1 5022
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5022 killed at Wed May 31 23:45:45 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) ----
selfserv starting at Wed May 31 23:45:45 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 -B -s \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A3 -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:45:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5474 >/dev/null 2>/dev/null
selfserv with PID 5474 found at Wed May 31 23:45:45 UTC 2017
selfserv with PID 5474 started at Wed May 31 23:45:45 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -w nss -V ssl3:tls1.2 -c 1000 -C :00A3 -N -n ExtendedSSLUser-dsa \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:45:45 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Wed May 31 23:48:16 UTC 2017
ssl.sh: #2203: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5474 at Wed May 31 23:48:16 UTC 2017
kill -USR1 5474
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5474 killed at Wed May 31 23:48:16 UTC 2017
ssl.sh: SSL Cipher Coverage - server normal/client bypass - with ECC ===============================
selfserv starting at Wed May 31 23:48:16 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:48:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:17 UTC 2017
selfserv with PID 5850 started at Wed May 31 23:48:17 UTC 2017
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2204: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2205: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2206: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2207: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2208: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2209: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2210: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2211: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2212: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2213: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2214: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2215: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2216: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:ssl3 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2217: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009F -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2218: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A3 -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2219: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009D -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2220: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2221: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2222: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2223: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2224: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2225: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2226: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2227: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2228: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2229: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2230: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2231: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2232: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2233: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2234: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2235: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2236: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2237: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2238: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2239: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2240: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2241: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2242: TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2243: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2244: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2245: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2246: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2247: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2248: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2249: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2250: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2251: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2252: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2253: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2254: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2255: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2256: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0016 -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2257: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0032 -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2258: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0033 -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2259: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0038 -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2260: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0039 -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2261: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003B -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2262: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003C -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2263: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003D -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2264: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0040 -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2265: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0067 -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2266: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006A -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2267: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006B -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2268: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009C -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2269: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009E -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2270: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A2 -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2271: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCAA -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2272: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2273: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2274: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2275: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2276: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2277: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2278: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2279: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2280: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2281: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 5850 >/dev/null 2>/dev/null
selfserv with PID 5850 found at Wed May 31 23:48:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2282: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 5850 at Wed May 31 23:48:41 UTC 2017
kill -USR1 5850
selfserv: 0 cache hits; 79 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5850 killed at Wed May 31 23:48:41 UTC 2017
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed May 31 23:48:41 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:48:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7687 >/dev/null 2>/dev/null
selfserv with PID 7687 found at Wed May 31 23:48:41 UTC 2017
selfserv with PID 7687 started at Wed May 31 23:48:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2283: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 7687 >/dev/null 2>/dev/null
selfserv with PID 7687 found at Wed May 31 23:48:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2284: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7687 >/dev/null 2>/dev/null
selfserv with PID 7687 found at Wed May 31 23:48:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2285: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7687 >/dev/null 2>/dev/null
selfserv with PID 7687 found at Wed May 31 23:48:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2286: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7687 >/dev/null 2>/dev/null
selfserv with PID 7687 found at Wed May 31 23:48:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2287: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 7687 at Wed May 31 23:48:43 UTC 2017
kill -USR1 7687
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7687 killed at Wed May 31 23:48:43 UTC 2017
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed May 31 23:48:44 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:48:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7825 >/dev/null 2>/dev/null
selfserv with PID 7825 found at Wed May 31 23:48:44 UTC 2017
selfserv with PID 7825 started at Wed May 31 23:48:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2288: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 7825 >/dev/null 2>/dev/null
selfserv with PID 7825 found at Wed May 31 23:48:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2289: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7825 >/dev/null 2>/dev/null
selfserv with PID 7825 found at Wed May 31 23:48:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2290: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7825 >/dev/null 2>/dev/null
selfserv with PID 7825 found at Wed May 31 23:48:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2291: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7825 >/dev/null 2>/dev/null
selfserv with PID 7825 found at Wed May 31 23:48:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.0 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2292: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 7825 >/dev/null 2>/dev/null
selfserv with PID 7825 found at Wed May 31 23:48:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2293: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 7825 >/dev/null 2>/dev/null
selfserv with PID 7825 found at Wed May 31 23:48:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2294: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7825 >/dev/null 2>/dev/null
selfserv with PID 7825 found at Wed May 31 23:48:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2295: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7825 >/dev/null 2>/dev/null
selfserv with PID 7825 found at Wed May 31 23:48:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2296: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7825 >/dev/null 2>/dev/null
selfserv with PID 7825 found at Wed May 31 23:48:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2297: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 7825 >/dev/null 2>/dev/null
selfserv with PID 7825 found at Wed May 31 23:48:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2298: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 7825 >/dev/null 2>/dev/null
selfserv with PID 7825 found at Wed May 31 23:48:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2299: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 7825 >/dev/null 2>/dev/null
selfserv with PID 7825 found at Wed May 31 23:48:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2300: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 7825 >/dev/null 2>/dev/null
selfserv with PID 7825 found at Wed May 31 23:48:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2301: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 7825 >/dev/null 2>/dev/null
selfserv with PID 7825 found at Wed May 31 23:48:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2302: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 7825 at Wed May 31 23:48:50 UTC 2017
kill -USR1 7825
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7825 killed at Wed May 31 23:48:50 UTC 2017
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed May 31 23:48:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:48:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8178 >/dev/null 2>/dev/null
selfserv with PID 8178 found at Wed May 31 23:48:50 UTC 2017
selfserv with PID 8178 started at Wed May 31 23:48:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2303: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 8178 >/dev/null 2>/dev/null
selfserv with PID 8178 found at Wed May 31 23:48:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2304: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8178 >/dev/null 2>/dev/null
selfserv with PID 8178 found at Wed May 31 23:48:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2305: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8178 >/dev/null 2>/dev/null
selfserv with PID 8178 found at Wed May 31 23:48:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2306: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8178 >/dev/null 2>/dev/null
selfserv with PID 8178 found at Wed May 31 23:48:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2307: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 8178 at Wed May 31 23:48:52 UTC 2017
kill -USR1 8178
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8178 killed at Wed May 31 23:48:52 UTC 2017
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed May 31 23:48:52 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:48:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8316 >/dev/null 2>/dev/null
selfserv with PID 8316 found at Wed May 31 23:48:52 UTC 2017
selfserv with PID 8316 started at Wed May 31 23:48:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2308: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 8316 >/dev/null 2>/dev/null
selfserv with PID 8316 found at Wed May 31 23:48:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2309: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8316 >/dev/null 2>/dev/null
selfserv with PID 8316 found at Wed May 31 23:48:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2310: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8316 >/dev/null 2>/dev/null
selfserv with PID 8316 found at Wed May 31 23:48:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2311: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8316 >/dev/null 2>/dev/null
selfserv with PID 8316 found at Wed May 31 23:48:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.1 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2312: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 8316 >/dev/null 2>/dev/null
selfserv with PID 8316 found at Wed May 31 23:48:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2313: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 8316 >/dev/null 2>/dev/null
selfserv with PID 8316 found at Wed May 31 23:48:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2314: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8316 >/dev/null 2>/dev/null
selfserv with PID 8316 found at Wed May 31 23:48:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2315: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8316 >/dev/null 2>/dev/null
selfserv with PID 8316 found at Wed May 31 23:48:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2316: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8316 >/dev/null 2>/dev/null
selfserv with PID 8316 found at Wed May 31 23:48:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2317: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 8316 >/dev/null 2>/dev/null
selfserv with PID 8316 found at Wed May 31 23:48:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2318: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 8316 >/dev/null 2>/dev/null
selfserv with PID 8316 found at Wed May 31 23:48:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2319: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8316 >/dev/null 2>/dev/null
selfserv with PID 8316 found at Wed May 31 23:48:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2320: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8316 >/dev/null 2>/dev/null
selfserv with PID 8316 found at Wed May 31 23:48:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2321: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8316 >/dev/null 2>/dev/null
selfserv with PID 8316 found at Wed May 31 23:48:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2322: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 8316 at Wed May 31 23:48:58 UTC 2017
kill -USR1 8316
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8316 killed at Wed May 31 23:48:58 UTC 2017
ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed May 31 23:48:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:48:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8669 >/dev/null 2>/dev/null
selfserv with PID 8669 found at Wed May 31 23:48:59 UTC 2017
selfserv with PID 8669 started at Wed May 31 23:48:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2323: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 8669 >/dev/null 2>/dev/null
selfserv with PID 8669 found at Wed May 31 23:48:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2324: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8669 >/dev/null 2>/dev/null
selfserv with PID 8669 found at Wed May 31 23:49:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2325: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8669 >/dev/null 2>/dev/null
selfserv with PID 8669 found at Wed May 31 23:49:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2326: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8669 >/dev/null 2>/dev/null
selfserv with PID 8669 found at Wed May 31 23:49:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2327: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 8669 at Wed May 31 23:49:01 UTC 2017
kill -USR1 8669
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8669 killed at Wed May 31 23:49:01 UTC 2017
ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed May 31 23:49:01 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8807 >/dev/null 2>/dev/null
selfserv with PID 8807 found at Wed May 31 23:49:01 UTC 2017
selfserv with PID 8807 started at Wed May 31 23:49:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2328: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 8807 >/dev/null 2>/dev/null
selfserv with PID 8807 found at Wed May 31 23:49:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2329: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8807 >/dev/null 2>/dev/null
selfserv with PID 8807 found at Wed May 31 23:49:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2330: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8807 >/dev/null 2>/dev/null
selfserv with PID 8807 found at Wed May 31 23:49:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2331: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8807 >/dev/null 2>/dev/null
selfserv with PID 8807 found at Wed May 31 23:49:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2332: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 8807 >/dev/null 2>/dev/null
selfserv with PID 8807 found at Wed May 31 23:49:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C023 -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2333: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 8807 >/dev/null 2>/dev/null
selfserv with PID 8807 found at Wed May 31 23:49:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C024 -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2334: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 8807 >/dev/null 2>/dev/null
selfserv with PID 8807 found at Wed May 31 23:49:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C027 -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2335: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 8807 >/dev/null 2>/dev/null
selfserv with PID 8807 found at Wed May 31 23:49:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C028 -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2336: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 8807 >/dev/null 2>/dev/null
selfserv with PID 8807 found at Wed May 31 23:49:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02B -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2337: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 8807 >/dev/null 2>/dev/null
selfserv with PID 8807 found at Wed May 31 23:49:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02C -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2338: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 8807 >/dev/null 2>/dev/null
selfserv with PID 8807 found at Wed May 31 23:49:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02F -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2339: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 8807 >/dev/null 2>/dev/null
selfserv with PID 8807 found at Wed May 31 23:49:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C030 -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2340: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 8807 >/dev/null 2>/dev/null
selfserv with PID 8807 found at Wed May 31 23:49:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA8 -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2341: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 8807 >/dev/null 2>/dev/null
selfserv with PID 8807 found at Wed May 31 23:49:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA9 -V ssl3:tls1.2 -B -s \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2342: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 8807 at Wed May 31 23:49:07 UTC 2017
kill -USR1 8807
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8807 killed at Wed May 31 23:49:07 UTC 2017
ssl.sh: SSL Client Authentication - server normal/client bypass - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed May 31 23:49:07 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9211 >/dev/null 2>/dev/null
selfserv with PID 9211 found at Wed May 31 23:49:08 UTC 2017
selfserv with PID 9211 started at Wed May 31 23:49:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2343: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9211 at Wed May 31 23:49:09 UTC 2017
kill -USR1 9211
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9211 killed at Wed May 31 23:49:09 UTC 2017
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Wed May 31 23:49:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9268 >/dev/null 2>/dev/null
selfserv with PID 9268 found at Wed May 31 23:49:09 UTC 2017
selfserv with PID 9268 started at Wed May 31 23:49:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.2 -w bogus -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2344: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9268 at Wed May 31 23:49:10 UTC 2017
kill -USR1 9268
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9268 killed at Wed May 31 23:49:10 UTC 2017
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Wed May 31 23:49:10 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9325 >/dev/null 2>/dev/null
selfserv with PID 9325 found at Wed May 31 23:49:10 UTC 2017
selfserv with PID 9325 started at Wed May 31 23:49:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.2 -w nss -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2345: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9325 at Wed May 31 23:49:11 UTC 2017
kill -USR1 9325
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9325 killed at Wed May 31 23:49:11 UTC 2017
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Wed May 31 23:49:11 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9382 >/dev/null 2>/dev/null
selfserv with PID 9382 found at Wed May 31 23:49:11 UTC 2017
selfserv with PID 9382 started at Wed May 31 23:49:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2346: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9382 at Wed May 31 23:49:12 UTC 2017
kill -USR1 9382
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9382 killed at Wed May 31 23:49:12 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Wed May 31 23:49:13 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9439 >/dev/null 2>/dev/null
selfserv with PID 9439 found at Wed May 31 23:49:13 UTC 2017
selfserv with PID 9439 started at Wed May 31 23:49:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.2 -w bogus -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2347: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9439 at Wed May 31 23:49:13 UTC 2017
kill -USR1 9439
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9439 killed at Wed May 31 23:49:13 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed May 31 23:49:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9496 >/dev/null 2>/dev/null
selfserv with PID 9496 found at Wed May 31 23:49:14 UTC 2017
selfserv with PID 9496 started at Wed May 31 23:49:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.2 -w nss -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2348: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9496 at Wed May 31 23:49:15 UTC 2017
kill -USR1 9496
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9496 killed at Wed May 31 23:49:15 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed May 31 23:49:15 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9553 >/dev/null 2>/dev/null
selfserv with PID 9553 found at Wed May 31 23:49:15 UTC 2017
selfserv with PID 9553 started at Wed May 31 23:49:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2349: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9553 at Wed May 31 23:49:16 UTC 2017
kill -USR1 9553
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9553 killed at Wed May 31 23:49:16 UTC 2017
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Wed May 31 23:49:16 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9610 >/dev/null 2>/dev/null
selfserv with PID 9610 found at Wed May 31 23:49:16 UTC 2017
selfserv with PID 9610 started at Wed May 31 23:49:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:ssl3 -n TestUser -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2350: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9610 at Wed May 31 23:49:17 UTC 2017
kill -USR1 9610
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9610 killed at Wed May 31 23:49:17 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Wed May 31 23:49:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9667 >/dev/null 2>/dev/null
selfserv with PID 9667 found at Wed May 31 23:49:17 UTC 2017
selfserv with PID 9667 started at Wed May 31 23:49:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:ssl3 -n TestUser -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2351: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9667 at Wed May 31 23:49:18 UTC 2017
kill -USR1 9667
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9667 killed at Wed May 31 23:49:18 UTC 2017
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Wed May 31 23:49:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9724 >/dev/null 2>/dev/null
selfserv with PID 9724 found at Wed May 31 23:49:18 UTC 2017
selfserv with PID 9724 started at Wed May 31 23:49:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2352: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9724 at Wed May 31 23:49:19 UTC 2017
kill -USR1 9724
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9724 killed at Wed May 31 23:49:19 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Wed May 31 23:49:19 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9781 >/dev/null 2>/dev/null
selfserv with PID 9781 found at Wed May 31 23:49:19 UTC 2017
selfserv with PID 9781 started at Wed May 31 23:49:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:ssl3 -n TestUser -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2353: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 9781 at Wed May 31 23:49:20 UTC 2017
kill -USR1 9781
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9781 killed at Wed May 31 23:49:20 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed May 31 23:49:20 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9838 >/dev/null 2>/dev/null
selfserv with PID 9838 found at Wed May 31 23:49:20 UTC 2017
selfserv with PID 9838 started at Wed May 31 23:49:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:ssl3 -n TestUser -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2354: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9838 at Wed May 31 23:49:21 UTC 2017
kill -USR1 9838
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9838 killed at Wed May 31 23:49:21 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:49:22 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9895 >/dev/null 2>/dev/null
selfserv with PID 9895 found at Wed May 31 23:49:22 UTC 2017
selfserv with PID 9895 started at Wed May 31 23:49:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2355: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9895 at Wed May 31 23:49:23 UTC 2017
kill -USR1 9895
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9895 killed at Wed May 31 23:49:23 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:49:23 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 9952 >/dev/null 2>/dev/null
selfserv with PID 9952 found at Wed May 31 23:49:23 UTC 2017
selfserv with PID 9952 started at Wed May 31 23:49:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.2 -w bogus -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2356: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 9952 at Wed May 31 23:49:24 UTC 2017
kill -USR1 9952
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 9952 killed at Wed May 31 23:49:24 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:49:24 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10009 >/dev/null 2>/dev/null
selfserv with PID 10009 found at Wed May 31 23:49:24 UTC 2017
selfserv with PID 10009 started at Wed May 31 23:49:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.2 -w nss -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2357: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10009 at Wed May 31 23:49:26 UTC 2017
kill -USR1 10009
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10009 killed at Wed May 31 23:49:26 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:49:26 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10066 >/dev/null 2>/dev/null
selfserv with PID 10066 found at Wed May 31 23:49:26 UTC 2017
selfserv with PID 10066 started at Wed May 31 23:49:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2358: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10066 at Wed May 31 23:49:27 UTC 2017
kill -USR1 10066
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10066 killed at Wed May 31 23:49:27 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:49:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10124 >/dev/null 2>/dev/null
selfserv with PID 10124 found at Wed May 31 23:49:27 UTC 2017
selfserv with PID 10124 started at Wed May 31 23:49:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.2 -w bogus -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2359: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10124 at Wed May 31 23:49:28 UTC 2017
kill -USR1 10124
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10124 killed at Wed May 31 23:49:28 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:49:28 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10181 >/dev/null 2>/dev/null
selfserv with PID 10181 found at Wed May 31 23:49:28 UTC 2017
selfserv with PID 10181 started at Wed May 31 23:49:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.2 -w nss -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2360: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10181 at Wed May 31 23:49:30 UTC 2017
kill -USR1 10181
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10181 killed at Wed May 31 23:49:30 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:49:30 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10239 >/dev/null 2>/dev/null
selfserv with PID 10239 found at Wed May 31 23:49:30 UTC 2017
selfserv with PID 10239 started at Wed May 31 23:49:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.0 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2361: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10239 at Wed May 31 23:49:31 UTC 2017
kill -USR1 10239
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10239 killed at Wed May 31 23:49:31 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:49:31 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10296 >/dev/null 2>/dev/null
selfserv with PID 10296 found at Wed May 31 23:49:32 UTC 2017
selfserv with PID 10296 started at Wed May 31 23:49:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.0 -w bogus -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2362: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10296 at Wed May 31 23:49:33 UTC 2017
kill -USR1 10296
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10296 killed at Wed May 31 23:49:33 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:49:33 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10353 >/dev/null 2>/dev/null
selfserv with PID 10353 found at Wed May 31 23:49:33 UTC 2017
selfserv with PID 10353 started at Wed May 31 23:49:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.0 -w nss -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2363: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10353 at Wed May 31 23:49:35 UTC 2017
kill -USR1 10353
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10353 killed at Wed May 31 23:49:35 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:49:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10410 >/dev/null 2>/dev/null
selfserv with PID 10410 found at Wed May 31 23:49:35 UTC 2017
selfserv with PID 10410 started at Wed May 31 23:49:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.0 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2364: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10410 at Wed May 31 23:49:36 UTC 2017
kill -USR1 10410
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10410 killed at Wed May 31 23:49:36 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:49:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10467 >/dev/null 2>/dev/null
selfserv with PID 10467 found at Wed May 31 23:49:36 UTC 2017
selfserv with PID 10467 started at Wed May 31 23:49:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.0 -w bogus -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2365: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10467 at Wed May 31 23:49:38 UTC 2017
kill -USR1 10467
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10467 killed at Wed May 31 23:49:38 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:49:38 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10524 >/dev/null 2>/dev/null
selfserv with PID 10524 found at Wed May 31 23:49:38 UTC 2017
selfserv with PID 10524 started at Wed May 31 23:49:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.0 -w nss -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2366: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10524 at Wed May 31 23:49:39 UTC 2017
kill -USR1 10524
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10524 killed at Wed May 31 23:49:40 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:49:40 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10583 >/dev/null 2>/dev/null
selfserv with PID 10583 found at Wed May 31 23:49:40 UTC 2017
selfserv with PID 10583 started at Wed May 31 23:49:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2367: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10583 at Wed May 31 23:49:41 UTC 2017
kill -USR1 10583
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10583 killed at Wed May 31 23:49:41 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:49:41 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10640 >/dev/null 2>/dev/null
selfserv with PID 10640 found at Wed May 31 23:49:41 UTC 2017
selfserv with PID 10640 started at Wed May 31 23:49:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:ssl3 -n TestUser -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2368: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10640 at Wed May 31 23:49:42 UTC 2017
kill -USR1 10640
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10640 killed at Wed May 31 23:49:42 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:49:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10697 >/dev/null 2>/dev/null
selfserv with PID 10697 found at Wed May 31 23:49:42 UTC 2017
selfserv with PID 10697 started at Wed May 31 23:49:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:ssl3 -n TestUser -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2369: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10697 at Wed May 31 23:49:44 UTC 2017
kill -USR1 10697
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10697 killed at Wed May 31 23:49:44 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:49:44 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10754 >/dev/null 2>/dev/null
selfserv with PID 10754 found at Wed May 31 23:49:44 UTC 2017
selfserv with PID 10754 started at Wed May 31 23:49:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2370: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10754 at Wed May 31 23:49:45 UTC 2017
kill -USR1 10754
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10754 killed at Wed May 31 23:49:45 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:49:45 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10811 >/dev/null 2>/dev/null
selfserv with PID 10811 found at Wed May 31 23:49:45 UTC 2017
selfserv with PID 10811 started at Wed May 31 23:49:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:ssl3 -n TestUser -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2371: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 10811 at Wed May 31 23:49:46 UTC 2017
kill -USR1 10811
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10811 killed at Wed May 31 23:49:46 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:49:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10868 >/dev/null 2>/dev/null
selfserv with PID 10868 found at Wed May 31 23:49:46 UTC 2017
selfserv with PID 10868 started at Wed May 31 23:49:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:ssl3 -n TestUser -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2372: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10868 at Wed May 31 23:49:47 UTC 2017
kill -USR1 10868
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10868 killed at Wed May 31 23:49:47 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed May 31 23:49:48 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10941 >/dev/null 2>/dev/null
selfserv with PID 10941 found at Wed May 31 23:49:48 UTC 2017
selfserv with PID 10941 started at Wed May 31 23:49:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.2 -w bogus -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2373: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10941 at Wed May 31 23:49:49 UTC 2017
kill -USR1 10941
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10941 killed at Wed May 31 23:49:49 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed May 31 23:49:49 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10998 >/dev/null 2>/dev/null
selfserv with PID 10998 found at Wed May 31 23:49:49 UTC 2017
selfserv with PID 10998 started at Wed May 31 23:49:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.2 -w nss -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2374: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 10998 at Wed May 31 23:49:50 UTC 2017
kill -USR1 10998
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10998 killed at Wed May 31 23:49:50 UTC 2017
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Wed May 31 23:49:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11055 >/dev/null 2>/dev/null
selfserv with PID 11055 found at Wed May 31 23:49:50 UTC 2017
selfserv with PID 11055 started at Wed May 31 23:49:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.2 -w bogus -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2375: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11055 at Wed May 31 23:49:51 UTC 2017
kill -USR1 11055
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11055 killed at Wed May 31 23:49:51 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Wed May 31 23:49:51 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11112 >/dev/null 2>/dev/null
selfserv with PID 11112 found at Wed May 31 23:49:52 UTC 2017
selfserv with PID 11112 started at Wed May 31 23:49:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.2 -w nss -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2376: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11112 at Wed May 31 23:49:53 UTC 2017
kill -USR1 11112
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11112 killed at Wed May 31 23:49:53 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Wed May 31 23:49:53 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11169 >/dev/null 2>/dev/null
selfserv with PID 11169 found at Wed May 31 23:49:53 UTC 2017
selfserv with PID 11169 started at Wed May 31 23:49:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:ssl3 -n TestUser-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2377: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11169 at Wed May 31 23:49:54 UTC 2017
kill -USR1 11169
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11169 killed at Wed May 31 23:49:54 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Wed May 31 23:49:54 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11226 >/dev/null 2>/dev/null
selfserv with PID 11226 found at Wed May 31 23:49:54 UTC 2017
selfserv with PID 11226 started at Wed May 31 23:49:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:ssl3 -n TestUser-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2378: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11226 at Wed May 31 23:49:55 UTC 2017
kill -USR1 11226
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11226 killed at Wed May 31 23:49:55 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Wed May 31 23:49:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11283 >/dev/null 2>/dev/null
selfserv with PID 11283 found at Wed May 31 23:49:55 UTC 2017
selfserv with PID 11283 started at Wed May 31 23:49:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:ssl3 -n TestUser-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2379: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11283 at Wed May 31 23:49:57 UTC 2017
kill -USR1 11283
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11283 killed at Wed May 31 23:49:57 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Wed May 31 23:49:57 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11340 >/dev/null 2>/dev/null
selfserv with PID 11340 found at Wed May 31 23:49:57 UTC 2017
selfserv with PID 11340 started at Wed May 31 23:49:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:ssl3 -n TestUser-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2380: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11340 at Wed May 31 23:49:58 UTC 2017
kill -USR1 11340
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11340 killed at Wed May 31 23:49:58 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:49:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11397 >/dev/null 2>/dev/null
selfserv with PID 11397 found at Wed May 31 23:49:58 UTC 2017
selfserv with PID 11397 started at Wed May 31 23:49:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.2 -w bogus -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2381: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11397 at Wed May 31 23:49:59 UTC 2017
kill -USR1 11397
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11397 killed at Wed May 31 23:49:59 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:49:59 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:49:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11455 >/dev/null 2>/dev/null
selfserv with PID 11455 found at Wed May 31 23:49:59 UTC 2017
selfserv with PID 11455 started at Wed May 31 23:50:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.2 -w nss -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2382: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11455 at Wed May 31 23:50:01 UTC 2017
kill -USR1 11455
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11455 killed at Wed May 31 23:50:01 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:50:01 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11512 >/dev/null 2>/dev/null
selfserv with PID 11512 found at Wed May 31 23:50:01 UTC 2017
selfserv with PID 11512 started at Wed May 31 23:50:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.2 -w bogus -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2383: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11512 at Wed May 31 23:50:02 UTC 2017
kill -USR1 11512
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11512 killed at Wed May 31 23:50:03 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:50:03 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11630 >/dev/null 2>/dev/null
selfserv with PID 11630 found at Wed May 31 23:50:03 UTC 2017
selfserv with PID 11630 started at Wed May 31 23:50:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.2 -w nss -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2384: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11630 at Wed May 31 23:50:04 UTC 2017
kill -USR1 11630
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11630 killed at Wed May 31 23:50:04 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:50:04 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11724 >/dev/null 2>/dev/null
selfserv with PID 11724 found at Wed May 31 23:50:05 UTC 2017
selfserv with PID 11724 started at Wed May 31 23:50:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.0 -w bogus -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2385: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11724 at Wed May 31 23:50:06 UTC 2017
kill -USR1 11724
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11724 killed at Wed May 31 23:50:06 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:50:06 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11784 >/dev/null 2>/dev/null
selfserv with PID 11784 found at Wed May 31 23:50:06 UTC 2017
selfserv with PID 11784 started at Wed May 31 23:50:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.0 -w nss -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2386: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11784 at Wed May 31 23:50:08 UTC 2017
kill -USR1 11784
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11784 killed at Wed May 31 23:50:08 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:50:08 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11889 >/dev/null 2>/dev/null
selfserv with PID 11889 found at Wed May 31 23:50:08 UTC 2017
selfserv with PID 11889 started at Wed May 31 23:50:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.0 -w bogus -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2387: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11889 at Wed May 31 23:50:10 UTC 2017
kill -USR1 11889
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11889 killed at Wed May 31 23:50:10 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:50:10 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12033 >/dev/null 2>/dev/null
selfserv with PID 12033 found at Wed May 31 23:50:10 UTC 2017
selfserv with PID 12033 started at Wed May 31 23:50:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.0 -w nss -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2388: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12033 at Wed May 31 23:50:12 UTC 2017
kill -USR1 12033
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12033 killed at Wed May 31 23:50:12 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:50:12 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12132 >/dev/null 2>/dev/null
selfserv with PID 12132 found at Wed May 31 23:50:12 UTC 2017
selfserv with PID 12132 started at Wed May 31 23:50:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:ssl3 -n TestUser-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2389: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12132 at Wed May 31 23:50:13 UTC 2017
kill -USR1 12132
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12132 killed at Wed May 31 23:50:13 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:50:13 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12214 >/dev/null 2>/dev/null
selfserv with PID 12214 found at Wed May 31 23:50:14 UTC 2017
selfserv with PID 12214 started at Wed May 31 23:50:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:ssl3 -n TestUser-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2390: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12214 at Wed May 31 23:50:15 UTC 2017
kill -USR1 12214
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12214 killed at Wed May 31 23:50:15 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Wed May 31 23:50:15 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12277 >/dev/null 2>/dev/null
selfserv with PID 12277 found at Wed May 31 23:50:15 UTC 2017
selfserv with PID 12277 started at Wed May 31 23:50:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:ssl3 -n TestUser-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2391: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12277 at Wed May 31 23:50:16 UTC 2017
kill -USR1 12277
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12277 killed at Wed May 31 23:50:16 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Wed May 31 23:50:16 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12416 >/dev/null 2>/dev/null
selfserv with PID 12416 found at Wed May 31 23:50:16 UTC 2017
selfserv with PID 12416 started at Wed May 31 23:50:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:ssl3 -n TestUser-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2392: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12416 at Wed May 31 23:50:18 UTC 2017
kill -USR1 12416
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12416 killed at Wed May 31 23:50:18 UTC 2017
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Wed May 31 23:50:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12494 >/dev/null 2>/dev/null
selfserv with PID 12494 found at Wed May 31 23:50:18 UTC 2017
selfserv with PID 12494 started at Wed May 31 23:50:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.2 -w nss -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2393: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12494 at Wed May 31 23:50:19 UTC 2017
kill -USR1 12494
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12494 killed at Wed May 31 23:50:19 UTC 2017
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Wed May 31 23:50:19 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12557 >/dev/null 2>/dev/null
selfserv with PID 12557 found at Wed May 31 23:50:20 UTC 2017
selfserv with PID 12557 started at Wed May 31 23:50:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.2 -c v -w nss -n TestUser -a testwandboard-sni.(none) < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=testwandboard-sni.(none),E=testwandboard-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2394: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12557 at Wed May 31 23:50:20 UTC 2017
kill -USR1 12557
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12557 killed at Wed May 31 23:50:20 UTC 2017
ssl.sh: TLS Server response with alert ----
selfserv starting at Wed May 31 23:50:21 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12620 >/dev/null 2>/dev/null
selfserv with PID 12620 found at Wed May 31 23:50:21 UTC 2017
selfserv with PID 12620 started at Wed May 31 23:50:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.2 -c v -w nss -n TestUser -a testwandboard-sni1.(none) < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2395: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12620 at Wed May 31 23:50:21 UTC 2017
kill -USR1 12620
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12620 killed at Wed May 31 23:50:21 UTC 2017
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Wed May 31 23:50:22 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12683 >/dev/null 2>/dev/null
selfserv with PID 12683 found at Wed May 31 23:50:22 UTC 2017
selfserv with PID 12683 started at Wed May 31 23:50:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:ssl3 -w nss -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2396: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12683 at Wed May 31 23:50:23 UTC 2017
kill -USR1 12683
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12683 killed at Wed May 31 23:50:23 UTC 2017
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Wed May 31 23:50:23 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12746 >/dev/null 2>/dev/null
selfserv with PID 12746 found at Wed May 31 23:50:23 UTC 2017
selfserv with PID 12746 started at Wed May 31 23:50:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:ssl3 -c v -w nss -n TestUser -a testwandboard-sni.(none) < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #2397: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12746 at Wed May 31 23:50:24 UTC 2017
kill -USR1 12746
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12746 killed at Wed May 31 23:50:24 UTC 2017
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Wed May 31 23:50:24 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12809 >/dev/null 2>/dev/null
selfserv with PID 12809 found at Wed May 31 23:50:24 UTC 2017
selfserv with PID 12809 started at Wed May 31 23:50:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.2 -w nss -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2398: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12809 at Wed May 31 23:50:25 UTC 2017
kill -USR1 12809
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12809 killed at Wed May 31 23:50:25 UTC 2017
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Wed May 31 23:50:25 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12872 >/dev/null 2>/dev/null
selfserv with PID 12872 found at Wed May 31 23:50:25 UTC 2017
selfserv with PID 12872 started at Wed May 31 23:50:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.2 -c v -w nss -n TestUser -a testwandboard-sni.(none) < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=testwandboard-sni.(none),E=testwandboard-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=testwandboard-sni.(none),E=testwandboard-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2399: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12872 at Wed May 31 23:50:26 UTC 2017
kill -USR1 12872
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12872 killed at Wed May 31 23:50:26 UTC 2017
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Wed May 31 23:50:26 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12935 >/dev/null 2>/dev/null
selfserv with PID 12935 found at Wed May 31 23:50:27 UTC 2017
selfserv with PID 12935 started at Wed May 31 23:50:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.2 -w nss -n TestUser -a testwandboard-sni.(none) -a testwandboard.(none) < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
ssl.sh: #2400: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12935 at Wed May 31 23:50:27 UTC 2017
kill -USR1 12935
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12935 killed at Wed May 31 23:50:28 UTC 2017
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Wed May 31 23:50:28 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12998 >/dev/null 2>/dev/null
selfserv with PID 12998 found at Wed May 31 23:50:28 UTC 2017
selfserv with PID 12998 started at Wed May 31 23:50:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.2 -c v -w nss -n TestUser -a testwandboard-sni.(none) -a testwandboard-sni1.(none) < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=testwandboard-sni.(none),E=testwandboard-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #2401: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12998 at Wed May 31 23:50:29 UTC 2017
kill -USR1 12998
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12998 killed at Wed May 31 23:50:29 UTC 2017
ssl.sh: TLS Server response with alert ----
selfserv starting at Wed May 31 23:50:29 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13061 >/dev/null 2>/dev/null
selfserv with PID 13061 found at Wed May 31 23:50:29 UTC 2017
selfserv with PID 13061 started at Wed May 31 23:50:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v -B -s \
-V ssl3:tls1.2 -c v -w nss -n TestUser -a testwandboard-sni1.(none) < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2402: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13061 at Wed May 31 23:50:29 UTC 2017
kill -USR1 13061
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13061 killed at Wed May 31 23:50:29 UTC 2017
./ssl.sh: line 1071: [: -nz: unary operator expected
ssl.sh: SSL Stress Test - server normal/client bypass - with ECC ===============================
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Wed May 31 23:50:30 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13171 >/dev/null 2>/dev/null
selfserv with PID 13171 found at Wed May 31 23:50:30 UTC 2017
selfserv with PID 13171 started at Wed May 31 23:50:30 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -c 1000 -C c -V ssl3:ssl3 \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:50:30 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:50:32 UTC 2017
ssl.sh: #2403: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13171 at Wed May 31 23:50:32 UTC 2017
kill -USR1 13171
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13171 killed at Wed May 31 23:50:32 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 ----
selfserv starting at Wed May 31 23:50:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13245 >/dev/null 2>/dev/null
selfserv with PID 13245 found at Wed May 31 23:50:32 UTC 2017
selfserv with PID 13245 started at Wed May 31 23:50:32 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -c 1000 -C c \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:50:32 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:50:34 UTC 2017
ssl.sh: #2404: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13245 at Wed May 31 23:50:34 UTC 2017
kill -USR1 13245
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13245 killed at Wed May 31 23:50:34 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (false start) ----
selfserv starting at Wed May 31 23:50:34 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13319 >/dev/null 2>/dev/null
selfserv with PID 13319 found at Wed May 31 23:50:34 UTC 2017
selfserv with PID 13319 started at Wed May 31 23:50:34 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -c 1000 -C c -g \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:50:34 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:50:36 UTC 2017
ssl.sh: #2405: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13319 at Wed May 31 23:50:36 UTC 2017
kill -USR1 13319
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13319 killed at Wed May 31 23:50:36 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ----
selfserv starting at Wed May 31 23:50:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13393 >/dev/null 2>/dev/null
selfserv with PID 13393 found at Wed May 31 23:50:37 UTC 2017
selfserv with PID 13393 started at Wed May 31 23:50:37 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C c -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:50:37 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Wed May 31 23:50:39 UTC 2017
ssl.sh: #2406: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13393 at Wed May 31 23:50:39 UTC 2017
kill -USR1 13393
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13393 killed at Wed May 31 23:50:39 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression) ----
selfserv starting at Wed May 31 23:50:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13467 >/dev/null 2>/dev/null
selfserv with PID 13467 found at Wed May 31 23:50:39 UTC 2017
selfserv with PID 13467 started at Wed May 31 23:50:39 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C c -z \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:50:39 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:50:41 UTC 2017
ssl.sh: #2407: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13467 at Wed May 31 23:50:41 UTC 2017
kill -USR1 13467
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13467 killed at Wed May 31 23:50:41 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Wed May 31 23:50:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13542 >/dev/null 2>/dev/null
selfserv with PID 13542 found at Wed May 31 23:50:42 UTC 2017
selfserv with PID 13542 started at Wed May 31 23:50:42 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:50:42 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Wed May 31 23:50:44 UTC 2017
ssl.sh: #2408: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13542 at Wed May 31 23:50:44 UTC 2017
kill -USR1 13542
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13542 killed at Wed May 31 23:50:44 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Wed May 31 23:50:44 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13616 >/dev/null 2>/dev/null
selfserv with PID 13616 found at Wed May 31 23:50:44 UTC 2017
selfserv with PID 13616 started at Wed May 31 23:50:44 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z -g \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:50:44 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Wed May 31 23:50:47 UTC 2017
ssl.sh: #2409: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13616 at Wed May 31 23:50:47 UTC 2017
kill -USR1 13616
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13616 killed at Wed May 31 23:50:47 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Wed May 31 23:50:47 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13696 >/dev/null 2>/dev/null
selfserv with PID 13696 found at Wed May 31 23:50:47 UTC 2017
selfserv with PID 13696 started at Wed May 31 23:50:47 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V tls1.0:tls1.2 -c 1000 -C c -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:50:47 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Wed May 31 23:50:49 UTC 2017
ssl.sh: #2410: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13696 at Wed May 31 23:50:49 UTC 2017
kill -USR1 13696
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13696 killed at Wed May 31 23:50:49 UTC 2017
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed May 31 23:50:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13785 >/dev/null 2>/dev/null
selfserv with PID 13785 found at Wed May 31 23:50:50 UTC 2017
selfserv with PID 13785 started at Wed May 31 23:50:50 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -c 100 -C c -V ssl3:ssl3 -N -n TestUser \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:50:50 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:50:54 UTC 2017
ssl.sh: #2411: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13785 at Wed May 31 23:50:54 UTC 2017
kill -USR1 13785
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13785 killed at Wed May 31 23:50:54 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Wed May 31 23:50:54 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13858 >/dev/null 2>/dev/null
selfserv with PID 13858 found at Wed May 31 23:50:54 UTC 2017
selfserv with PID 13858 started at Wed May 31 23:50:55 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -c 100 -C c -N -n TestUser \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:50:55 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:50:59 UTC 2017
ssl.sh: #2412: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13858 at Wed May 31 23:50:59 UTC 2017
kill -USR1 13858
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13858 killed at Wed May 31 23:50:59 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Wed May 31 23:50:59 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:50:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13931 >/dev/null 2>/dev/null
selfserv with PID 13931 found at Wed May 31 23:50:59 UTC 2017
selfserv with PID 13931 started at Wed May 31 23:50:59 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:50:59 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Wed May 31 23:51:00 UTC 2017
ssl.sh: #2413: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 13931 at Wed May 31 23:51:00 UTC 2017
kill -USR1 13931
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13931 killed at Wed May 31 23:51:00 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Wed May 31 23:51:01 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:51:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14005 >/dev/null 2>/dev/null
selfserv with PID 14005 found at Wed May 31 23:51:01 UTC 2017
selfserv with PID 14005 started at Wed May 31 23:51:01 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -z \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:51:01 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:51:02 UTC 2017
ssl.sh: #2414: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14005 at Wed May 31 23:51:02 UTC 2017
kill -USR1 14005
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14005 killed at Wed May 31 23:51:02 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Wed May 31 23:51:02 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:51:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14079 >/dev/null 2>/dev/null
selfserv with PID 14079 found at Wed May 31 23:51:02 UTC 2017
selfserv with PID 14079 started at Wed May 31 23:51:02 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -z -g \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:51:02 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:51:03 UTC 2017
ssl.sh: #2415: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14079 at Wed May 31 23:51:03 UTC 2017
kill -USR1 14079
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14079 killed at Wed May 31 23:51:03 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Wed May 31 23:51:03 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:51:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14153 >/dev/null 2>/dev/null
selfserv with PID 14153 found at Wed May 31 23:51:03 UTC 2017
selfserv with PID 14153 started at Wed May 31 23:51:03 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u -z \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:51:03 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Wed May 31 23:51:04 UTC 2017
ssl.sh: #2416: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14153 at Wed May 31 23:51:05 UTC 2017
kill -USR1 14153
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14153 killed at Wed May 31 23:51:05 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Wed May 31 23:51:05 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:51:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14227 >/dev/null 2>/dev/null
selfserv with PID 14227 found at Wed May 31 23:51:05 UTC 2017
selfserv with PID 14227 started at Wed May 31 23:51:05 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u -z -g \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:51:05 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Wed May 31 23:51:06 UTC 2017
ssl.sh: #2417: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14227 at Wed May 31 23:51:06 UTC 2017
kill -USR1 14227
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14227 killed at Wed May 31 23:51:06 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Wed May 31 23:51:06 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:51:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14307 >/dev/null 2>/dev/null
selfserv with PID 14307 found at Wed May 31 23:51:06 UTC 2017
selfserv with PID 14307 started at Wed May 31 23:51:06 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V tls1.0:tls1.2 -c 1000 -C c -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:51:06 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Wed May 31 23:51:09 UTC 2017
ssl.sh: #2418: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14307 at Wed May 31 23:51:09 UTC 2017
kill -USR1 14307
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14307 killed at Wed May 31 23:51:09 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Wed May 31 23:51:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -a testwandboard-sni.(none) -k testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:51:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14387 >/dev/null 2>/dev/null
selfserv with PID 14387 found at Wed May 31 23:51:09 UTC 2017
selfserv with PID 14387 started at Wed May 31 23:51:09 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V tls1.0:tls1.2 -c 1000 -C c -u -a testwandboard-sni.(none) \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:51:09 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Wed May 31 23:51:11 UTC 2017
ssl.sh: #2419: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14387 at Wed May 31 23:51:12 UTC 2017
kill -USR1 14387
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14387 killed at Wed May 31 23:51:12 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed May 31 23:51:12 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:51:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14476 >/dev/null 2>/dev/null
selfserv with PID 14476 found at Wed May 31 23:51:12 UTC 2017
selfserv with PID 14476 started at Wed May 31 23:51:12 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C009 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:51:12 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:51:20 UTC 2017
ssl.sh: #2420: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14476 at Wed May 31 23:51:20 UTC 2017
kill -USR1 14476
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14476 killed at Wed May 31 23:51:20 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ----
selfserv starting at Wed May 31 23:51:20 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C023 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:51:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14549 >/dev/null 2>/dev/null
selfserv with PID 14549 found at Wed May 31 23:51:20 UTC 2017
selfserv with PID 14549 started at Wed May 31 23:51:20 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C023 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:51:20 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:51:27 UTC 2017
ssl.sh: #2421: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14549 at Wed May 31 23:51:28 UTC 2017
kill -USR1 14549
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14549 killed at Wed May 31 23:51:28 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ----
selfserv starting at Wed May 31 23:51:28 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02B -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:51:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14622 >/dev/null 2>/dev/null
selfserv with PID 14622 found at Wed May 31 23:51:28 UTC 2017
selfserv with PID 14622 started at Wed May 31 23:51:28 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C02B -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:51:28 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:51:36 UTC 2017
ssl.sh: #2422: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14622 at Wed May 31 23:51:36 UTC 2017
kill -USR1 14622
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14622 killed at Wed May 31 23:51:36 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed May 31 23:51:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:51:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14695 >/dev/null 2>/dev/null
selfserv with PID 14695 found at Wed May 31 23:51:36 UTC 2017
selfserv with PID 14695 started at Wed May 31 23:51:36 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C004 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:51:36 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:51:46 UTC 2017
ssl.sh: #2423: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14695 at Wed May 31 23:51:46 UTC 2017
kill -USR1 14695
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14695 killed at Wed May 31 23:51:46 UTC 2017
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Wed May 31 23:51:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C00E -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:51:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14768 >/dev/null 2>/dev/null
selfserv with PID 14768 found at Wed May 31 23:51:46 UTC 2017
selfserv with PID 14768 started at Wed May 31 23:51:46 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C00E -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:51:46 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:51:53 UTC 2017
ssl.sh: #2424: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14768 at Wed May 31 23:51:53 UTC 2017
kill -USR1 14768
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14768 killed at Wed May 31 23:51:53 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ----
selfserv starting at Wed May 31 23:51:53 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C013 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:51:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14841 >/dev/null 2>/dev/null
selfserv with PID 14841 found at Wed May 31 23:51:53 UTC 2017
selfserv with PID 14841 started at Wed May 31 23:51:53 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :C013 \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:51:53 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:51:55 UTC 2017
ssl.sh: #2425: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14841 at Wed May 31 23:51:55 UTC 2017
kill -USR1 14841
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14841 killed at Wed May 31 23:51:55 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ----
selfserv starting at Wed May 31 23:51:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C027 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:51:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14915 >/dev/null 2>/dev/null
selfserv with PID 14915 found at Wed May 31 23:51:55 UTC 2017
selfserv with PID 14915 started at Wed May 31 23:51:55 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :C027 \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:51:55 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:51:57 UTC 2017
ssl.sh: #2426: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14915 at Wed May 31 23:51:57 UTC 2017
kill -USR1 14915
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14915 killed at Wed May 31 23:51:58 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ----
selfserv starting at Wed May 31 23:51:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02F -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:51:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 14989 >/dev/null 2>/dev/null
selfserv with PID 14989 found at Wed May 31 23:51:58 UTC 2017
selfserv with PID 14989 started at Wed May 31 23:51:58 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :C02F \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:51:58 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:52:00 UTC 2017
ssl.sh: #2427: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 14989 at Wed May 31 23:52:00 UTC 2017
kill -USR1 14989
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 14989 killed at Wed May 31 23:52:00 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ----
selfserv starting at Wed May 31 23:52:00 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:52:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15063 >/dev/null 2>/dev/null
selfserv with PID 15063 found at Wed May 31 23:52:00 UTC 2017
selfserv with PID 15063 started at Wed May 31 23:52:00 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :C004 -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:52:00 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Wed May 31 23:52:02 UTC 2017
ssl.sh: #2428: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 15063 at Wed May 31 23:52:02 UTC 2017
kill -USR1 15063
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15063 killed at Wed May 31 23:52:03 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ----
selfserv starting at Wed May 31 23:52:03 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:52:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15137 >/dev/null 2>/dev/null
selfserv with PID 15137 found at Wed May 31 23:52:03 UTC 2017
selfserv with PID 15137 started at Wed May 31 23:52:03 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C009 -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:52:03 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Wed May 31 23:52:04 UTC 2017
ssl.sh: #2429: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 15137 at Wed May 31 23:52:04 UTC 2017
kill -USR1 15137
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15137 killed at Wed May 31 23:52:04 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed May 31 23:52:04 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C009 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:52:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15226 >/dev/null 2>/dev/null
selfserv with PID 15226 found at Wed May 31 23:52:04 UTC 2017
selfserv with PID 15226 started at Wed May 31 23:52:04 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 10 -C :C009 -N -n TestUser-ec \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:52:04 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed May 31 23:52:07 UTC 2017
ssl.sh: #2430: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 15226 at Wed May 31 23:52:07 UTC 2017
kill -USR1 15226
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15226 killed at Wed May 31 23:52:07 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Wed May 31 23:52:07 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:52:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15299 >/dev/null 2>/dev/null
selfserv with PID 15299 found at Wed May 31 23:52:07 UTC 2017
selfserv with PID 15299 started at Wed May 31 23:52:07 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:52:07 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:52:08 UTC 2017
ssl.sh: #2431: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 15299 at Wed May 31 23:52:08 UTC 2017
kill -USR1 15299
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15299 killed at Wed May 31 23:52:08 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed May 31 23:52:08 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C004 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:52:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15374 >/dev/null 2>/dev/null
selfserv with PID 15374 found at Wed May 31 23:52:08 UTC 2017
selfserv with PID 15374 started at Wed May 31 23:52:08 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 10 -C :C004 -N -n TestUser-ec \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:52:08 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed May 31 23:52:11 UTC 2017
ssl.sh: #2432: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 15374 at Wed May 31 23:52:11 UTC 2017
kill -USR1 15374
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15374 killed at Wed May 31 23:52:11 UTC 2017
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Wed May 31 23:52:11 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -r -r -c :C00E -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:52:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15447 >/dev/null 2>/dev/null
selfserv with PID 15447 found at Wed May 31 23:52:11 UTC 2017
selfserv with PID 15447 started at Wed May 31 23:52:11 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 10 -C :C00E -N -n TestUser-ecmixed \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:52:11 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Wed May 31 23:52:13 UTC 2017
ssl.sh: #2433: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 15447 at Wed May 31 23:52:13 UTC 2017
kill -USR1 15447
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15447 killed at Wed May 31 23:52:13 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Wed May 31 23:52:13 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:52:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15520 >/dev/null 2>/dev/null
selfserv with PID 15520 found at Wed May 31 23:52:13 UTC 2017
selfserv with PID 15520 started at Wed May 31 23:52:13 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:52:13 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:52:15 UTC 2017
ssl.sh: #2434: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 15520 at Wed May 31 23:52:15 UTC 2017
kill -USR1 15520
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15520 killed at Wed May 31 23:52:15 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Wed May 31 23:52:15 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:52:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15594 >/dev/null 2>/dev/null
selfserv with PID 15594 found at Wed May 31 23:52:15 UTC 2017
selfserv with PID 15594 started at Wed May 31 23:52:15 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:52:15 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Wed May 31 23:52:16 UTC 2017
ssl.sh: #2435: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 15594 at Wed May 31 23:52:16 UTC 2017
kill -USR1 15594
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15594 killed at Wed May 31 23:52:16 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ----
selfserv starting at Wed May 31 23:52:16 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0016 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:52:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15683 >/dev/null 2>/dev/null
selfserv with PID 15683 found at Wed May 31 23:52:16 UTC 2017
selfserv with PID 15683 started at Wed May 31 23:52:17 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :0016 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:52:17 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:52:22 UTC 2017
ssl.sh: #2436: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 15683 at Wed May 31 23:52:22 UTC 2017
kill -USR1 15683
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15683 killed at Wed May 31 23:52:23 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ----
selfserv starting at Wed May 31 23:52:23 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0033 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:52:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15756 >/dev/null 2>/dev/null
selfserv with PID 15756 found at Wed May 31 23:52:23 UTC 2017
selfserv with PID 15756 started at Wed May 31 23:52:23 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :0033 \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:52:23 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:52:25 UTC 2017
ssl.sh: #2437: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 15756 at Wed May 31 23:52:25 UTC 2017
kill -USR1 15756
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15756 killed at Wed May 31 23:52:25 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Wed May 31 23:52:25 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0039 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:52:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15830 >/dev/null 2>/dev/null
selfserv with PID 15830 found at Wed May 31 23:52:25 UTC 2017
selfserv with PID 15830 started at Wed May 31 23:52:25 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :0039 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:52:25 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:52:31 UTC 2017
ssl.sh: #2438: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 15830 at Wed May 31 23:52:31 UTC 2017
kill -USR1 15830
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15830 killed at Wed May 31 23:52:31 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ----
selfserv starting at Wed May 31 23:52:31 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0040 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:52:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15903 >/dev/null 2>/dev/null
selfserv with PID 15903 found at Wed May 31 23:52:31 UTC 2017
selfserv with PID 15903 started at Wed May 31 23:52:31 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :0040 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:52:31 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:52:38 UTC 2017
ssl.sh: #2439: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 15903 at Wed May 31 23:52:38 UTC 2017
kill -USR1 15903
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15903 killed at Wed May 31 23:52:38 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Wed May 31 23:52:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0038 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:52:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 15986 >/dev/null 2>/dev/null
selfserv with PID 15986 found at Wed May 31 23:52:39 UTC 2017
selfserv with PID 15986 started at Wed May 31 23:52:39 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :0038 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:52:39 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Wed May 31 23:53:44 UTC 2017
ssl.sh: #2440: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 15986 at Wed May 31 23:53:44 UTC 2017
kill -USR1 15986
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 15986 killed at Wed May 31 23:53:44 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ----
selfserv starting at Wed May 31 23:53:44 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006A -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:53:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16376 >/dev/null 2>/dev/null
selfserv with PID 16376 found at Wed May 31 23:53:44 UTC 2017
selfserv with PID 16376 started at Wed May 31 23:53:44 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :006A -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:53:44 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Wed May 31 23:54:48 UTC 2017
ssl.sh: #2441: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 16376 at Wed May 31 23:54:48 UTC 2017
kill -USR1 16376
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16376 killed at Wed May 31 23:54:48 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ----
selfserv starting at Wed May 31 23:54:49 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006B -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:54:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16450 >/dev/null 2>/dev/null
selfserv with PID 16450 found at Wed May 31 23:54:49 UTC 2017
selfserv with PID 16450 started at Wed May 31 23:54:49 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :006B -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:54:49 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:54:54 UTC 2017
ssl.sh: #2442: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 16450 at Wed May 31 23:54:54 UTC 2017
kill -USR1 16450
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16450 killed at Wed May 31 23:54:54 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ----
selfserv starting at Wed May 31 23:54:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009E -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:54:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16523 >/dev/null 2>/dev/null
selfserv with PID 16523 found at Wed May 31 23:54:55 UTC 2017
selfserv with PID 16523 started at Wed May 31 23:54:55 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :009E -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:54:55 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:55:00 UTC 2017
ssl.sh: #2443: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 16523 at Wed May 31 23:55:01 UTC 2017
kill -USR1 16523
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16523 killed at Wed May 31 23:55:01 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) ----
selfserv starting at Wed May 31 23:55:01 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009F -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:55:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16596 >/dev/null 2>/dev/null
selfserv with PID 16596 found at Wed May 31 23:55:01 UTC 2017
selfserv with PID 16596 started at Wed May 31 23:55:01 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :009F -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:55:01 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:55:07 UTC 2017
ssl.sh: #2444: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 16596 at Wed May 31 23:55:08 UTC 2017
kill -USR1 16596
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16596 killed at Wed May 31 23:55:08 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ----
selfserv starting at Wed May 31 23:55:08 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0032 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:55:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 16773 >/dev/null 2>/dev/null
selfserv with PID 16773 found at Wed May 31 23:55:08 UTC 2017
selfserv with PID 16773 started at Wed May 31 23:55:08 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :0032 -N -n TestUser-dsa \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:55:08 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Wed May 31 23:55:20 UTC 2017
ssl.sh: #2445: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 16773 at Wed May 31 23:55:20 UTC 2017
kill -USR1 16773
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 16773 killed at Wed May 31 23:55:20 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ----
selfserv starting at Wed May 31 23:55:20 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0067 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:55:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17044 >/dev/null 2>/dev/null
selfserv with PID 17044 found at Wed May 31 23:55:20 UTC 2017
selfserv with PID 17044 started at Wed May 31 23:55:20 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :0067 -n TestUser-dsamixed \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:55:20 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Wed May 31 23:55:22 UTC 2017
ssl.sh: #2446: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 17044 at Wed May 31 23:55:23 UTC 2017
kill -USR1 17044
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17044 killed at Wed May 31 23:55:23 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ----
selfserv starting at Wed May 31 23:55:23 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:55:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17201 >/dev/null 2>/dev/null
selfserv with PID 17201 found at Wed May 31 23:55:23 UTC 2017
selfserv with PID 17201 started at Wed May 31 23:55:23 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :00A2 -N -n TestUser-dsa \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:55:23 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Wed May 31 23:56:58 UTC 2017
ssl.sh: #2447: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 17201 at Wed May 31 23:56:58 UTC 2017
kill -USR1 17201
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17201 killed at Wed May 31 23:56:58 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) ----
selfserv starting at Wed May 31 23:56:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A3 -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:56:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17274 >/dev/null 2>/dev/null
selfserv with PID 17274 found at Wed May 31 23:56:58 UTC 2017
selfserv with PID 17274 started at Wed May 31 23:56:58 UTC 2017
strsclnt -q -p 8443 -d ../client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :00A3 -N -n TestUser-dsa \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Wed May 31 23:56:58 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Wed May 31 23:58:35 UTC 2017
ssl.sh: #2448: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 17274 at Wed May 31 23:58:36 UTC 2017
kill -USR1 17274
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17274 killed at Wed May 31 23:58:36 UTC 2017
ssl.sh: SSL Cipher Coverage Extended Test - server normal/client bypass - with ECC ===============================
selfserv starting at Wed May 31 23:58:36 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:58:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:36 UTC 2017
selfserv with PID 17643 started at Wed May 31 23:58:36 UTC 2017
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2449: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2450: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2451: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2452: SSL3_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2453: SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2454: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2455: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2456: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2457: SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2458: SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2459: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2460: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2461: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:ssl3 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2462: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009F -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2463: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A3 -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2464: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009D -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2465: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2466: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2467: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2468: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_40_MD5 ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c f -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 40-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2469: TLS_RSA_EXPORT_WITH_RC4_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c g -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 40-bit RC2 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2470: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2471: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2472: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2473: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2474: TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2475: TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2476: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2477: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2478: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2479: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2480: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2481: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2482: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2483: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2484: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2485: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c l -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2486: TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c m -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 512-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2487: TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2488: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2489: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2490: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2491: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2492: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2493: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2494: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2495: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2496: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2497: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2498: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2499: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2500: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2501: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0016 -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2502: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0032 -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2503: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0033 -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2504: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0038 -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2505: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0039 -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2506: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003B -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2507: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003C -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2508: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003D -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2509: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0040 -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2510: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0067 -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2511: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006A -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2512: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006B -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2513: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009C -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2514: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009E -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2515: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A2 -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2516: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCAA -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2517: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2518: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2519: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2520: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2521: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2522: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:58:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2523: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:59:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2524: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:59:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2525: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:59:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2526: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 17643 >/dev/null 2>/dev/null
selfserv with PID 17643 found at Wed May 31 23:59:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2527: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 17643 at Wed May 31 23:59:02 UTC 2017
kill -USR1 17643
selfserv: 0 cache hits; 79 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 17643 killed at Wed May 31 23:59:02 UTC 2017
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed May 31 23:59:02 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:59:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19479 >/dev/null 2>/dev/null
selfserv with PID 19479 found at Wed May 31 23:59:02 UTC 2017
selfserv with PID 19479 started at Wed May 31 23:59:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2528: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 19479 >/dev/null 2>/dev/null
selfserv with PID 19479 found at Wed May 31 23:59:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2529: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19479 >/dev/null 2>/dev/null
selfserv with PID 19479 found at Wed May 31 23:59:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2530: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 19479 >/dev/null 2>/dev/null
selfserv with PID 19479 found at Wed May 31 23:59:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2531: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 19479 >/dev/null 2>/dev/null
selfserv with PID 19479 found at Wed May 31 23:59:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2532: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 19479 at Wed May 31 23:59:04 UTC 2017
kill -USR1 19479
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19479 killed at Wed May 31 23:59:04 UTC 2017
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed May 31 23:59:04 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:59:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19617 >/dev/null 2>/dev/null
selfserv with PID 19617 found at Wed May 31 23:59:04 UTC 2017
selfserv with PID 19617 started at Wed May 31 23:59:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2533: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 19617 >/dev/null 2>/dev/null
selfserv with PID 19617 found at Wed May 31 23:59:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2534: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19617 >/dev/null 2>/dev/null
selfserv with PID 19617 found at Wed May 31 23:59:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2535: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 19617 >/dev/null 2>/dev/null
selfserv with PID 19617 found at Wed May 31 23:59:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2536: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 19617 >/dev/null 2>/dev/null
selfserv with PID 19617 found at Wed May 31 23:59:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.0 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2537: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 19617 >/dev/null 2>/dev/null
selfserv with PID 19617 found at Wed May 31 23:59:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2538: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 19617 >/dev/null 2>/dev/null
selfserv with PID 19617 found at Wed May 31 23:59:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2539: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19617 >/dev/null 2>/dev/null
selfserv with PID 19617 found at Wed May 31 23:59:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2540: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 19617 >/dev/null 2>/dev/null
selfserv with PID 19617 found at Wed May 31 23:59:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2541: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 19617 >/dev/null 2>/dev/null
selfserv with PID 19617 found at Wed May 31 23:59:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2542: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 19617 >/dev/null 2>/dev/null
selfserv with PID 19617 found at Wed May 31 23:59:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2543: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 19617 >/dev/null 2>/dev/null
selfserv with PID 19617 found at Wed May 31 23:59:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2544: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19617 >/dev/null 2>/dev/null
selfserv with PID 19617 found at Wed May 31 23:59:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2545: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 19617 >/dev/null 2>/dev/null
selfserv with PID 19617 found at Wed May 31 23:59:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2546: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 19617 >/dev/null 2>/dev/null
selfserv with PID 19617 found at Wed May 31 23:59:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2547: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 19617 at Wed May 31 23:59:11 UTC 2017
kill -USR1 19617
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19617 killed at Wed May 31 23:59:11 UTC 2017
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed May 31 23:59:11 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:59:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 19972 >/dev/null 2>/dev/null
selfserv with PID 19972 found at Wed May 31 23:59:11 UTC 2017
selfserv with PID 19972 started at Wed May 31 23:59:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2548: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 19972 >/dev/null 2>/dev/null
selfserv with PID 19972 found at Wed May 31 23:59:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2549: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 19972 >/dev/null 2>/dev/null
selfserv with PID 19972 found at Wed May 31 23:59:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2550: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 19972 >/dev/null 2>/dev/null
selfserv with PID 19972 found at Wed May 31 23:59:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2551: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 19972 >/dev/null 2>/dev/null
selfserv with PID 19972 found at Wed May 31 23:59:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2552: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 19972 at Wed May 31 23:59:12 UTC 2017
kill -USR1 19972
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 19972 killed at Wed May 31 23:59:12 UTC 2017
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed May 31 23:59:13 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:59:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20110 >/dev/null 2>/dev/null
selfserv with PID 20110 found at Wed May 31 23:59:13 UTC 2017
selfserv with PID 20110 started at Wed May 31 23:59:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2553: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 20110 >/dev/null 2>/dev/null
selfserv with PID 20110 found at Wed May 31 23:59:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2554: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20110 >/dev/null 2>/dev/null
selfserv with PID 20110 found at Wed May 31 23:59:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2555: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 20110 >/dev/null 2>/dev/null
selfserv with PID 20110 found at Wed May 31 23:59:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2556: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 20110 >/dev/null 2>/dev/null
selfserv with PID 20110 found at Wed May 31 23:59:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.1 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2557: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 20110 >/dev/null 2>/dev/null
selfserv with PID 20110 found at Wed May 31 23:59:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2558: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 20110 >/dev/null 2>/dev/null
selfserv with PID 20110 found at Wed May 31 23:59:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2559: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20110 >/dev/null 2>/dev/null
selfserv with PID 20110 found at Wed May 31 23:59:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2560: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 20110 >/dev/null 2>/dev/null
selfserv with PID 20110 found at Wed May 31 23:59:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2561: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 20110 >/dev/null 2>/dev/null
selfserv with PID 20110 found at Wed May 31 23:59:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2562: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 20110 >/dev/null 2>/dev/null
selfserv with PID 20110 found at Wed May 31 23:59:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2563: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 20110 >/dev/null 2>/dev/null
selfserv with PID 20110 found at Wed May 31 23:59:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2564: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20110 >/dev/null 2>/dev/null
selfserv with PID 20110 found at Wed May 31 23:59:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2565: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 20110 >/dev/null 2>/dev/null
selfserv with PID 20110 found at Wed May 31 23:59:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2566: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 20110 >/dev/null 2>/dev/null
selfserv with PID 20110 found at Wed May 31 23:59:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2567: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 20110 at Wed May 31 23:59:19 UTC 2017
kill -USR1 20110
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20110 killed at Wed May 31 23:59:19 UTC 2017
ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Wed May 31 23:59:19 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:59:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20463 >/dev/null 2>/dev/null
selfserv with PID 20463 found at Wed May 31 23:59:19 UTC 2017
selfserv with PID 20463 started at Wed May 31 23:59:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2568: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 20463 >/dev/null 2>/dev/null
selfserv with PID 20463 found at Wed May 31 23:59:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2569: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20463 >/dev/null 2>/dev/null
selfserv with PID 20463 found at Wed May 31 23:59:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2570: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 20463 >/dev/null 2>/dev/null
selfserv with PID 20463 found at Wed May 31 23:59:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2571: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 20463 >/dev/null 2>/dev/null
selfserv with PID 20463 found at Wed May 31 23:59:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2572: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 20463 at Wed May 31 23:59:21 UTC 2017
kill -USR1 20463
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20463 killed at Wed May 31 23:59:21 UTC 2017
ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Wed May 31 23:59:21 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:59:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 20601 >/dev/null 2>/dev/null
selfserv with PID 20601 found at Wed May 31 23:59:21 UTC 2017
selfserv with PID 20601 started at Wed May 31 23:59:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2573: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 20601 >/dev/null 2>/dev/null
selfserv with PID 20601 found at Wed May 31 23:59:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2574: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 20601 >/dev/null 2>/dev/null
selfserv with PID 20601 found at Wed May 31 23:59:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2575: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 20601 >/dev/null 2>/dev/null
selfserv with PID 20601 found at Wed May 31 23:59:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2576: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 20601 >/dev/null 2>/dev/null
selfserv with PID 20601 found at Wed May 31 23:59:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2577: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 20601 >/dev/null 2>/dev/null
selfserv with PID 20601 found at Wed May 31 23:59:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C023 -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2578: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 20601 >/dev/null 2>/dev/null
selfserv with PID 20601 found at Wed May 31 23:59:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C024 -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2579: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 20601 >/dev/null 2>/dev/null
selfserv with PID 20601 found at Wed May 31 23:59:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C027 -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2580: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 20601 >/dev/null 2>/dev/null
selfserv with PID 20601 found at Wed May 31 23:59:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C028 -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2581: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 20601 >/dev/null 2>/dev/null
selfserv with PID 20601 found at Wed May 31 23:59:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02B -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2582: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 20601 >/dev/null 2>/dev/null
selfserv with PID 20601 found at Wed May 31 23:59:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02C -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2583: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 20601 >/dev/null 2>/dev/null
selfserv with PID 20601 found at Wed May 31 23:59:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02F -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2584: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 20601 >/dev/null 2>/dev/null
selfserv with PID 20601 found at Wed May 31 23:59:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C030 -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2585: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 20601 >/dev/null 2>/dev/null
selfserv with PID 20601 found at Wed May 31 23:59:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA8 -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2586: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 20601 >/dev/null 2>/dev/null
selfserv with PID 20601 found at Wed May 31 23:59:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA9 -V ssl3:tls1.2 -B -s \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2587: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 20601 at Wed May 31 23:59:27 UTC 2017
kill -USR1 20601
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 20601 killed at Wed May 31 23:59:27 UTC 2017
ssl.sh: SSL Client Authentication Extended Test - server normal/client bypass - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed May 31 23:59:27 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:59:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21057 >/dev/null 2>/dev/null
selfserv with PID 21057 found at Wed May 31 23:59:27 UTC 2017
selfserv with PID 21057 started at Wed May 31 23:59:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2588: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21057 at Wed May 31 23:59:28 UTC 2017
kill -USR1 21057
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21057 killed at Wed May 31 23:59:28 UTC 2017
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Wed May 31 23:59:29 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:59:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21114 >/dev/null 2>/dev/null
selfserv with PID 21114 found at Wed May 31 23:59:29 UTC 2017
selfserv with PID 21114 started at Wed May 31 23:59:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:tls1.2 -w bogus -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2589: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21114 at Wed May 31 23:59:30 UTC 2017
kill -USR1 21114
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21114 killed at Wed May 31 23:59:30 UTC 2017
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Wed May 31 23:59:30 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:59:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21171 >/dev/null 2>/dev/null
selfserv with PID 21171 found at Wed May 31 23:59:30 UTC 2017
selfserv with PID 21171 started at Wed May 31 23:59:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:tls1.2 -w nss -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2590: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21171 at Wed May 31 23:59:31 UTC 2017
kill -USR1 21171
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21171 killed at Wed May 31 23:59:31 UTC 2017
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Wed May 31 23:59:31 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:59:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21228 >/dev/null 2>/dev/null
selfserv with PID 21228 found at Wed May 31 23:59:31 UTC 2017
selfserv with PID 21228 started at Wed May 31 23:59:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2591: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21228 at Wed May 31 23:59:32 UTC 2017
kill -USR1 21228
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21228 killed at Wed May 31 23:59:32 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Wed May 31 23:59:32 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:59:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21285 >/dev/null 2>/dev/null
selfserv with PID 21285 found at Wed May 31 23:59:32 UTC 2017
selfserv with PID 21285 started at Wed May 31 23:59:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:tls1.2 -w bogus -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2592: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21285 at Wed May 31 23:59:33 UTC 2017
kill -USR1 21285
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21285 killed at Wed May 31 23:59:33 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Wed May 31 23:59:34 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:59:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21342 >/dev/null 2>/dev/null
selfserv with PID 21342 found at Wed May 31 23:59:34 UTC 2017
selfserv with PID 21342 started at Wed May 31 23:59:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:tls1.2 -w nss -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2593: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21342 at Wed May 31 23:59:35 UTC 2017
kill -USR1 21342
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21342 killed at Wed May 31 23:59:35 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Wed May 31 23:59:35 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:59:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21399 >/dev/null 2>/dev/null
selfserv with PID 21399 found at Wed May 31 23:59:35 UTC 2017
selfserv with PID 21399 started at Wed May 31 23:59:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2594: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21399 at Wed May 31 23:59:36 UTC 2017
kill -USR1 21399
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21399 killed at Wed May 31 23:59:36 UTC 2017
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Wed May 31 23:59:36 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:59:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21456 >/dev/null 2>/dev/null
selfserv with PID 21456 found at Wed May 31 23:59:36 UTC 2017
selfserv with PID 21456 started at Wed May 31 23:59:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2595: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21456 at Wed May 31 23:59:37 UTC 2017
kill -USR1 21456
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21456 killed at Wed May 31 23:59:37 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Wed May 31 23:59:38 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:59:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21513 >/dev/null 2>/dev/null
selfserv with PID 21513 found at Wed May 31 23:59:38 UTC 2017
selfserv with PID 21513 started at Wed May 31 23:59:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:ssl3 -n ExtendedSSLUser -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2596: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21513 at Wed May 31 23:59:39 UTC 2017
kill -USR1 21513
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21513 killed at Wed May 31 23:59:39 UTC 2017
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Wed May 31 23:59:39 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:59:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21570 >/dev/null 2>/dev/null
selfserv with PID 21570 found at Wed May 31 23:59:39 UTC 2017
selfserv with PID 21570 started at Wed May 31 23:59:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2597: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21570 at Wed May 31 23:59:40 UTC 2017
kill -USR1 21570
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21570 killed at Wed May 31 23:59:40 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Wed May 31 23:59:40 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:59:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21627 >/dev/null 2>/dev/null
selfserv with PID 21627 found at Wed May 31 23:59:40 UTC 2017
selfserv with PID 21627 started at Wed May 31 23:59:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2598: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21627 at Wed May 31 23:59:41 UTC 2017
kill -USR1 21627
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21627 killed at Wed May 31 23:59:41 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Wed May 31 23:59:41 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:59:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21684 >/dev/null 2>/dev/null
selfserv with PID 21684 found at Wed May 31 23:59:41 UTC 2017
selfserv with PID 21684 started at Wed May 31 23:59:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:ssl3 -n ExtendedSSLUser -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2599: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21684 at Wed May 31 23:59:42 UTC 2017
kill -USR1 21684
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21684 killed at Wed May 31 23:59:42 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:59:42 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:59:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21741 >/dev/null 2>/dev/null
selfserv with PID 21741 found at Wed May 31 23:59:42 UTC 2017
selfserv with PID 21741 started at Wed May 31 23:59:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2600: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21741 at Wed May 31 23:59:44 UTC 2017
kill -USR1 21741
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21741 killed at Wed May 31 23:59:44 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:59:44 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:59:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21798 >/dev/null 2>/dev/null
selfserv with PID 21798 found at Wed May 31 23:59:44 UTC 2017
selfserv with PID 21798 started at Wed May 31 23:59:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:tls1.2 -w bogus -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2601: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21798 at Wed May 31 23:59:45 UTC 2017
kill -USR1 21798
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21798 killed at Wed May 31 23:59:45 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:59:46 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:59:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21855 >/dev/null 2>/dev/null
selfserv with PID 21855 found at Wed May 31 23:59:46 UTC 2017
selfserv with PID 21855 started at Wed May 31 23:59:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:tls1.2 -w nss -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2602: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 21855 at Wed May 31 23:59:47 UTC 2017
kill -USR1 21855
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21855 killed at Wed May 31 23:59:47 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:59:47 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:59:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21912 >/dev/null 2>/dev/null
selfserv with PID 21912 found at Wed May 31 23:59:47 UTC 2017
selfserv with PID 21912 started at Wed May 31 23:59:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2603: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21912 at Wed May 31 23:59:49 UTC 2017
kill -USR1 21912
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21912 killed at Wed May 31 23:59:49 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:59:49 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:59:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 21969 >/dev/null 2>/dev/null
selfserv with PID 21969 found at Wed May 31 23:59:49 UTC 2017
selfserv with PID 21969 started at Wed May 31 23:59:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:tls1.2 -w bogus -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2604: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 21969 at Wed May 31 23:59:50 UTC 2017
kill -USR1 21969
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 21969 killed at Wed May 31 23:59:50 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:59:50 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:59:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22026 >/dev/null 2>/dev/null
selfserv with PID 22026 found at Wed May 31 23:59:50 UTC 2017
selfserv with PID 22026 started at Wed May 31 23:59:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:tls1.2 -w nss -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2605: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22026 at Wed May 31 23:59:52 UTC 2017
kill -USR1 22026
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22026 killed at Wed May 31 23:59:52 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:59:52 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:59:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22084 >/dev/null 2>/dev/null
selfserv with PID 22084 found at Wed May 31 23:59:52 UTC 2017
selfserv with PID 22084 started at Wed May 31 23:59:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:tls1.0 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2606: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22084 at Wed May 31 23:59:53 UTC 2017
kill -USR1 22084
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22084 killed at Wed May 31 23:59:53 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:59:53 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:59:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22141 >/dev/null 2>/dev/null
selfserv with PID 22141 found at Wed May 31 23:59:53 UTC 2017
selfserv with PID 22141 started at Wed May 31 23:59:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2607: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22141 at Wed May 31 23:59:55 UTC 2017
kill -USR1 22141
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22141 killed at Wed May 31 23:59:55 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Wed May 31 23:59:55 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:59:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22198 >/dev/null 2>/dev/null
selfserv with PID 22198 found at Wed May 31 23:59:55 UTC 2017
selfserv with PID 22198 started at Wed May 31 23:59:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2608: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22198 at Wed May 31 23:59:56 UTC 2017
kill -USR1 22198
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22198 killed at Wed May 31 23:59:56 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Wed May 31 23:59:56 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:59:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22255 >/dev/null 2>/dev/null
selfserv with PID 22255 found at Wed May 31 23:59:56 UTC 2017
selfserv with PID 22255 started at Wed May 31 23:59:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:tls1.0 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2609: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22255 at Wed May 31 23:59:58 UTC 2017
kill -USR1 22255
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22255 killed at Wed May 31 23:59:58 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Wed May 31 23:59:58 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Wed May 31 23:59:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22312 >/dev/null 2>/dev/null
selfserv with PID 22312 found at Wed May 31 23:59:58 UTC 2017
selfserv with PID 22312 started at Wed May 31 23:59:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2610: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22312 at Thu Jun 1 00:00:00 UTC 2017
kill -USR1 22312
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22312 killed at Thu Jun 1 00:00:00 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Jun 1 00:00:00 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22369 >/dev/null 2>/dev/null
selfserv with PID 22369 found at Thu Jun 1 00:00:00 UTC 2017
selfserv with PID 22369 started at Thu Jun 1 00:00:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2611: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22369 at Thu Jun 1 00:00:01 UTC 2017
kill -USR1 22369
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22369 killed at Thu Jun 1 00:00:01 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Jun 1 00:00:02 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22428 >/dev/null 2>/dev/null
selfserv with PID 22428 found at Thu Jun 1 00:00:02 UTC 2017
selfserv with PID 22428 started at Thu Jun 1 00:00:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2612: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22428 at Thu Jun 1 00:00:03 UTC 2017
kill -USR1 22428
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22428 killed at Thu Jun 1 00:00:03 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Jun 1 00:00:03 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22520 >/dev/null 2>/dev/null
selfserv with PID 22520 found at Thu Jun 1 00:00:03 UTC 2017
selfserv with PID 22520 started at Thu Jun 1 00:00:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2613: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22520 at Thu Jun 1 00:00:04 UTC 2017
kill -USR1 22520
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22520 killed at Thu Jun 1 00:00:04 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Jun 1 00:00:04 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22601 >/dev/null 2>/dev/null
selfserv with PID 22601 found at Thu Jun 1 00:00:04 UTC 2017
selfserv with PID 22601 started at Thu Jun 1 00:00:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:ssl3 -n ExtendedSSLUser -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2614: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22601 at Thu Jun 1 00:00:05 UTC 2017
kill -USR1 22601
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22601 killed at Thu Jun 1 00:00:06 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Jun 1 00:00:06 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22660 >/dev/null 2>/dev/null
selfserv with PID 22660 found at Thu Jun 1 00:00:06 UTC 2017
selfserv with PID 22660 started at Thu Jun 1 00:00:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2615: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22660 at Thu Jun 1 00:00:07 UTC 2017
kill -USR1 22660
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22660 killed at Thu Jun 1 00:00:07 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Jun 1 00:00:07 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22724 >/dev/null 2>/dev/null
selfserv with PID 22724 found at Thu Jun 1 00:00:07 UTC 2017
selfserv with PID 22724 started at Thu Jun 1 00:00:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2616: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 22724 at Thu Jun 1 00:00:08 UTC 2017
kill -USR1 22724
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22724 killed at Thu Jun 1 00:00:08 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Jun 1 00:00:09 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22810 >/dev/null 2>/dev/null
selfserv with PID 22810 found at Thu Jun 1 00:00:09 UTC 2017
selfserv with PID 22810 started at Thu Jun 1 00:00:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:ssl3 -n ExtendedSSLUser -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2617: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22810 at Thu Jun 1 00:00:10 UTC 2017
kill -USR1 22810
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22810 killed at Thu Jun 1 00:00:10 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Thu Jun 1 00:00:10 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 22938 >/dev/null 2>/dev/null
selfserv with PID 22938 found at Thu Jun 1 00:00:10 UTC 2017
selfserv with PID 22938 started at Thu Jun 1 00:00:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2618: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 22938 at Thu Jun 1 00:00:11 UTC 2017
kill -USR1 22938
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 22938 killed at Thu Jun 1 00:00:11 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Thu Jun 1 00:00:11 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23035 >/dev/null 2>/dev/null
selfserv with PID 23035 found at Thu Jun 1 00:00:12 UTC 2017
selfserv with PID 23035 started at Thu Jun 1 00:00:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2619: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23035 at Thu Jun 1 00:00:13 UTC 2017
kill -USR1 23035
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23035 killed at Thu Jun 1 00:00:13 UTC 2017
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Thu Jun 1 00:00:13 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23121 >/dev/null 2>/dev/null
selfserv with PID 23121 found at Thu Jun 1 00:00:13 UTC 2017
selfserv with PID 23121 started at Thu Jun 1 00:00:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2620: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23121 at Thu Jun 1 00:00:14 UTC 2017
kill -USR1 23121
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23121 killed at Thu Jun 1 00:00:14 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Thu Jun 1 00:00:14 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23184 >/dev/null 2>/dev/null
selfserv with PID 23184 found at Thu Jun 1 00:00:14 UTC 2017
selfserv with PID 23184 started at Thu Jun 1 00:00:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2621: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23184 at Thu Jun 1 00:00:16 UTC 2017
kill -USR1 23184
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23184 killed at Thu Jun 1 00:00:16 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Thu Jun 1 00:00:16 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23260 >/dev/null 2>/dev/null
selfserv with PID 23260 found at Thu Jun 1 00:00:16 UTC 2017
selfserv with PID 23260 started at Thu Jun 1 00:00:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2622: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23260 at Thu Jun 1 00:00:17 UTC 2017
kill -USR1 23260
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23260 killed at Thu Jun 1 00:00:17 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Thu Jun 1 00:00:17 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23321 >/dev/null 2>/dev/null
selfserv with PID 23321 found at Thu Jun 1 00:00:17 UTC 2017
selfserv with PID 23321 started at Thu Jun 1 00:00:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2623: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23321 at Thu Jun 1 00:00:18 UTC 2017
kill -USR1 23321
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23321 killed at Thu Jun 1 00:00:18 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Thu Jun 1 00:00:19 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23409 >/dev/null 2>/dev/null
selfserv with PID 23409 found at Thu Jun 1 00:00:19 UTC 2017
selfserv with PID 23409 started at Thu Jun 1 00:00:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2624: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23409 at Thu Jun 1 00:00:20 UTC 2017
kill -USR1 23409
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23409 killed at Thu Jun 1 00:00:20 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Thu Jun 1 00:00:20 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23466 >/dev/null 2>/dev/null
selfserv with PID 23466 found at Thu Jun 1 00:00:20 UTC 2017
selfserv with PID 23466 started at Thu Jun 1 00:00:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2625: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23466 at Thu Jun 1 00:00:21 UTC 2017
kill -USR1 23466
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23466 killed at Thu Jun 1 00:00:21 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Jun 1 00:00:21 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23576 >/dev/null 2>/dev/null
selfserv with PID 23576 found at Thu Jun 1 00:00:21 UTC 2017
selfserv with PID 23576 started at Thu Jun 1 00:00:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2626: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23576 at Thu Jun 1 00:00:23 UTC 2017
kill -USR1 23576
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23576 killed at Thu Jun 1 00:00:23 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Jun 1 00:00:23 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23633 >/dev/null 2>/dev/null
selfserv with PID 23633 found at Thu Jun 1 00:00:23 UTC 2017
selfserv with PID 23633 started at Thu Jun 1 00:00:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2627: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23633 at Thu Jun 1 00:00:25 UTC 2017
kill -USR1 23633
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23633 killed at Thu Jun 1 00:00:25 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Jun 1 00:00:25 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23692 >/dev/null 2>/dev/null
selfserv with PID 23692 found at Thu Jun 1 00:00:25 UTC 2017
selfserv with PID 23692 started at Thu Jun 1 00:00:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2628: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23692 at Thu Jun 1 00:00:26 UTC 2017
kill -USR1 23692
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23692 killed at Thu Jun 1 00:00:26 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Jun 1 00:00:26 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23749 >/dev/null 2>/dev/null
selfserv with PID 23749 found at Thu Jun 1 00:00:26 UTC 2017
selfserv with PID 23749 started at Thu Jun 1 00:00:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2629: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23749 at Thu Jun 1 00:00:28 UTC 2017
kill -USR1 23749
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23749 killed at Thu Jun 1 00:00:28 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Jun 1 00:00:28 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23806 >/dev/null 2>/dev/null
selfserv with PID 23806 found at Thu Jun 1 00:00:28 UTC 2017
selfserv with PID 23806 started at Thu Jun 1 00:00:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2630: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23806 at Thu Jun 1 00:00:29 UTC 2017
kill -USR1 23806
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23806 killed at Thu Jun 1 00:00:29 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Jun 1 00:00:30 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23864 >/dev/null 2>/dev/null
selfserv with PID 23864 found at Thu Jun 1 00:00:30 UTC 2017
selfserv with PID 23864 started at Thu Jun 1 00:00:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2631: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23864 at Thu Jun 1 00:00:31 UTC 2017
kill -USR1 23864
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23864 killed at Thu Jun 1 00:00:31 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Jun 1 00:00:31 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23922 >/dev/null 2>/dev/null
selfserv with PID 23922 found at Thu Jun 1 00:00:31 UTC 2017
selfserv with PID 23922 started at Thu Jun 1 00:00:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:tls1.0 -w bogus -n ExtendedSSLUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2632: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 23922 at Thu Jun 1 00:00:33 UTC 2017
kill -USR1 23922
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23922 killed at Thu Jun 1 00:00:33 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Jun 1 00:00:33 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 23979 >/dev/null 2>/dev/null
selfserv with PID 23979 found at Thu Jun 1 00:00:33 UTC 2017
selfserv with PID 23979 started at Thu Jun 1 00:00:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:tls1.0 -w nss -n ExtendedSSLUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2633: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 23979 at Thu Jun 1 00:00:34 UTC 2017
kill -USR1 23979
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 23979 killed at Thu Jun 1 00:00:34 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Jun 1 00:00:35 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24036 >/dev/null 2>/dev/null
selfserv with PID 24036 found at Thu Jun 1 00:00:35 UTC 2017
selfserv with PID 24036 started at Thu Jun 1 00:00:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2634: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24036 at Thu Jun 1 00:00:36 UTC 2017
kill -USR1 24036
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24036 killed at Thu Jun 1 00:00:36 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Jun 1 00:00:36 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24093 >/dev/null 2>/dev/null
selfserv with PID 24093 found at Thu Jun 1 00:00:36 UTC 2017
selfserv with PID 24093 started at Thu Jun 1 00:00:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2635: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24093 at Thu Jun 1 00:00:37 UTC 2017
kill -USR1 24093
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24093 killed at Thu Jun 1 00:00:37 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Jun 1 00:00:37 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24150 >/dev/null 2>/dev/null
selfserv with PID 24150 found at Thu Jun 1 00:00:38 UTC 2017
selfserv with PID 24150 started at Thu Jun 1 00:00:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:ssl3 -n ExtendedSSLUser-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2636: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 24150 at Thu Jun 1 00:00:39 UTC 2017
kill -USR1 24150
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24150 killed at Thu Jun 1 00:00:39 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Jun 1 00:00:39 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24207 >/dev/null 2>/dev/null
selfserv with PID 24207 found at Thu Jun 1 00:00:39 UTC 2017
selfserv with PID 24207 started at Thu Jun 1 00:00:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v -B -s \
-V ssl3:ssl3 -n ExtendedSSLUser-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2637: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 24207 at Thu Jun 1 00:00:41 UTC 2017
kill -USR1 24207
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24207 killed at Thu Jun 1 00:00:41 UTC 2017
ssl.sh: skipping TLS Server hello response without SNI for Extended Test
ssl.sh: skipping TLS Server hello response with SNI for Extended Test
ssl.sh: skipping TLS Server response with alert for Extended Test
ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test
ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test
ssl.sh: skipping TLS Server hello response without SNI for Extended Test
ssl.sh: skipping TLS Server hello response with SNI for Extended Test
ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test
ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test
ssl.sh: skipping TLS Server response with alert for Extended Test
./ssl.sh: line 1071: [: -nz: unary operator expected
ssl.sh: SSL Stress Test Extended Test - server normal/client bypass - with ECC ===============================
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Thu Jun 1 00:00:41 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24352 >/dev/null 2>/dev/null
selfserv with PID 24352 found at Thu Jun 1 00:00:41 UTC 2017
selfserv with PID 24352 started at Thu Jun 1 00:00:41 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -c 1000 -C c -V ssl3:ssl3 \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:00:41 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Thu Jun 1 00:00:43 UTC 2017
ssl.sh: #2638: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 24352 at Thu Jun 1 00:00:43 UTC 2017
kill -USR1 24352
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24352 killed at Thu Jun 1 00:00:43 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 ----
selfserv starting at Thu Jun 1 00:00:43 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24426 >/dev/null 2>/dev/null
selfserv with PID 24426 found at Thu Jun 1 00:00:43 UTC 2017
selfserv with PID 24426 started at Thu Jun 1 00:00:44 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -c 1000 -C c \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:00:44 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Thu Jun 1 00:00:45 UTC 2017
ssl.sh: #2639: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 24426 at Thu Jun 1 00:00:45 UTC 2017
kill -USR1 24426
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24426 killed at Thu Jun 1 00:00:45 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (false start) ----
selfserv starting at Thu Jun 1 00:00:46 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24500 >/dev/null 2>/dev/null
selfserv with PID 24500 found at Thu Jun 1 00:00:46 UTC 2017
selfserv with PID 24500 started at Thu Jun 1 00:00:46 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -c 1000 -C c -g \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:00:46 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Thu Jun 1 00:00:48 UTC 2017
ssl.sh: #2640: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 24500 at Thu Jun 1 00:00:48 UTC 2017
kill -USR1 24500
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24500 killed at Thu Jun 1 00:00:48 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ----
selfserv starting at Thu Jun 1 00:00:48 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24574 >/dev/null 2>/dev/null
selfserv with PID 24574 found at Thu Jun 1 00:00:48 UTC 2017
selfserv with PID 24574 started at Thu Jun 1 00:00:48 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C c -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:00:48 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Thu Jun 1 00:00:50 UTC 2017
ssl.sh: #2641: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 24574 at Thu Jun 1 00:00:50 UTC 2017
kill -USR1 24574
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24574 killed at Thu Jun 1 00:00:50 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression) ----
selfserv starting at Thu Jun 1 00:00:50 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24648 >/dev/null 2>/dev/null
selfserv with PID 24648 found at Thu Jun 1 00:00:50 UTC 2017
selfserv with PID 24648 started at Thu Jun 1 00:00:50 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C c -z \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:00:50 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Thu Jun 1 00:00:53 UTC 2017
ssl.sh: #2642: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 24648 at Thu Jun 1 00:00:53 UTC 2017
kill -USR1 24648
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24648 killed at Thu Jun 1 00:00:53 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Thu Jun 1 00:00:53 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24722 >/dev/null 2>/dev/null
selfserv with PID 24722 found at Thu Jun 1 00:00:53 UTC 2017
selfserv with PID 24722 started at Thu Jun 1 00:00:53 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:00:53 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Thu Jun 1 00:00:55 UTC 2017
ssl.sh: #2643: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 24722 at Thu Jun 1 00:00:56 UTC 2017
kill -USR1 24722
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24722 killed at Thu Jun 1 00:00:56 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Thu Jun 1 00:00:56 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24796 >/dev/null 2>/dev/null
selfserv with PID 24796 found at Thu Jun 1 00:00:56 UTC 2017
selfserv with PID 24796 started at Thu Jun 1 00:00:56 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z -g \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:00:56 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Thu Jun 1 00:00:58 UTC 2017
ssl.sh: #2644: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 24796 at Thu Jun 1 00:00:58 UTC 2017
kill -USR1 24796
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24796 killed at Thu Jun 1 00:00:58 UTC 2017
ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI) for Extended Test
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Thu Jun 1 00:00:59 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:00:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24887 >/dev/null 2>/dev/null
selfserv with PID 24887 found at Thu Jun 1 00:00:59 UTC 2017
selfserv with PID 24887 started at Thu Jun 1 00:00:59 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -c 100 -C c -V ssl3:ssl3 -N -n ExtendedSSLUser \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:00:59 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Jun 1 00:01:04 UTC 2017
ssl.sh: #2645: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 24887 at Thu Jun 1 00:01:04 UTC 2017
kill -USR1 24887
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24887 killed at Thu Jun 1 00:01:04 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Thu Jun 1 00:01:04 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:01:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 24960 >/dev/null 2>/dev/null
selfserv with PID 24960 found at Thu Jun 1 00:01:04 UTC 2017
selfserv with PID 24960 started at Thu Jun 1 00:01:04 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -c 100 -C c -N -n ExtendedSSLUser \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:01:04 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Jun 1 00:01:09 UTC 2017
ssl.sh: #2646: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 24960 at Thu Jun 1 00:01:09 UTC 2017
kill -USR1 24960
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 24960 killed at Thu Jun 1 00:01:09 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Thu Jun 1 00:01:09 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:01:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25033 >/dev/null 2>/dev/null
selfserv with PID 25033 found at Thu Jun 1 00:01:09 UTC 2017
selfserv with PID 25033 started at Thu Jun 1 00:01:09 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:01:09 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Thu Jun 1 00:01:10 UTC 2017
ssl.sh: #2647: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 25033 at Thu Jun 1 00:01:10 UTC 2017
kill -USR1 25033
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25033 killed at Thu Jun 1 00:01:10 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Thu Jun 1 00:01:11 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:01:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25107 >/dev/null 2>/dev/null
selfserv with PID 25107 found at Thu Jun 1 00:01:11 UTC 2017
selfserv with PID 25107 started at Thu Jun 1 00:01:11 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -z \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:01:11 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Thu Jun 1 00:01:12 UTC 2017
ssl.sh: #2648: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 25107 at Thu Jun 1 00:01:12 UTC 2017
kill -USR1 25107
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25107 killed at Thu Jun 1 00:01:12 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Thu Jun 1 00:01:12 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:01:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25181 >/dev/null 2>/dev/null
selfserv with PID 25181 found at Thu Jun 1 00:01:12 UTC 2017
selfserv with PID 25181 started at Thu Jun 1 00:01:12 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -z -g \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:01:12 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Thu Jun 1 00:01:13 UTC 2017
ssl.sh: #2649: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 25181 at Thu Jun 1 00:01:13 UTC 2017
kill -USR1 25181
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25181 killed at Thu Jun 1 00:01:13 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Thu Jun 1 00:01:13 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:01:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25255 >/dev/null 2>/dev/null
selfserv with PID 25255 found at Thu Jun 1 00:01:13 UTC 2017
selfserv with PID 25255 started at Thu Jun 1 00:01:13 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u -z \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:01:13 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Thu Jun 1 00:01:14 UTC 2017
ssl.sh: #2650: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 25255 at Thu Jun 1 00:01:15 UTC 2017
kill -USR1 25255
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25255 killed at Thu Jun 1 00:01:15 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Thu Jun 1 00:01:15 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:01:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25329 >/dev/null 2>/dev/null
selfserv with PID 25329 found at Thu Jun 1 00:01:15 UTC 2017
selfserv with PID 25329 started at Thu Jun 1 00:01:15 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C c -n ExtendedSSLUser -u -z -g \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:01:15 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Thu Jun 1 00:01:16 UTC 2017
ssl.sh: #2651: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 25329 at Thu Jun 1 00:01:16 UTC 2017
kill -USR1 25329
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25329 killed at Thu Jun 1 00:01:16 UTC 2017
ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) for Extended Test
ssl.sh: skipping Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) for Extended Test
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Thu Jun 1 00:01:16 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:01:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25422 >/dev/null 2>/dev/null
selfserv with PID 25422 found at Thu Jun 1 00:01:16 UTC 2017
selfserv with PID 25422 started at Thu Jun 1 00:01:16 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C009 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:01:16 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Jun 1 00:01:28 UTC 2017
ssl.sh: #2652: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 25422 at Thu Jun 1 00:01:28 UTC 2017
kill -USR1 25422
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25422 killed at Thu Jun 1 00:01:28 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ----
selfserv starting at Thu Jun 1 00:01:28 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C023 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:01:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25495 >/dev/null 2>/dev/null
selfserv with PID 25495 found at Thu Jun 1 00:01:28 UTC 2017
selfserv with PID 25495 started at Thu Jun 1 00:01:28 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C023 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:01:28 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Jun 1 00:01:39 UTC 2017
ssl.sh: #2653: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 25495 at Thu Jun 1 00:01:40 UTC 2017
kill -USR1 25495
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25495 killed at Thu Jun 1 00:01:40 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ----
selfserv starting at Thu Jun 1 00:01:40 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02B -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:01:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25568 >/dev/null 2>/dev/null
selfserv with PID 25568 found at Thu Jun 1 00:01:40 UTC 2017
selfserv with PID 25568 started at Thu Jun 1 00:01:40 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C02B -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:01:40 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Jun 1 00:01:51 UTC 2017
ssl.sh: #2654: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 25568 at Thu Jun 1 00:01:51 UTC 2017
kill -USR1 25568
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25568 killed at Thu Jun 1 00:01:51 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Thu Jun 1 00:01:52 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:01:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25641 >/dev/null 2>/dev/null
selfserv with PID 25641 found at Thu Jun 1 00:01:52 UTC 2017
selfserv with PID 25641 started at Thu Jun 1 00:01:52 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C004 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:01:52 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Jun 1 00:02:03 UTC 2017
ssl.sh: #2655: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 25641 at Thu Jun 1 00:02:03 UTC 2017
kill -USR1 25641
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25641 killed at Thu Jun 1 00:02:03 UTC 2017
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Thu Jun 1 00:02:03 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C00E -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:02:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25714 >/dev/null 2>/dev/null
selfserv with PID 25714 found at Thu Jun 1 00:02:03 UTC 2017
selfserv with PID 25714 started at Thu Jun 1 00:02:03 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C00E -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:02:03 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Jun 1 00:02:05 UTC 2017
ssl.sh: #2656: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 25714 at Thu Jun 1 00:02:05 UTC 2017
kill -USR1 25714
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25714 killed at Thu Jun 1 00:02:05 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ----
selfserv starting at Thu Jun 1 00:02:06 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C013 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:02:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25787 >/dev/null 2>/dev/null
selfserv with PID 25787 found at Thu Jun 1 00:02:06 UTC 2017
selfserv with PID 25787 started at Thu Jun 1 00:02:06 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :C013 \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:02:06 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Thu Jun 1 00:02:08 UTC 2017
ssl.sh: #2657: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 25787 at Thu Jun 1 00:02:08 UTC 2017
kill -USR1 25787
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25787 killed at Thu Jun 1 00:02:08 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ----
selfserv starting at Thu Jun 1 00:02:08 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C027 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:02:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25862 >/dev/null 2>/dev/null
selfserv with PID 25862 found at Thu Jun 1 00:02:08 UTC 2017
selfserv with PID 25862 started at Thu Jun 1 00:02:08 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :C027 \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:02:08 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Thu Jun 1 00:02:10 UTC 2017
ssl.sh: #2658: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 25862 at Thu Jun 1 00:02:10 UTC 2017
kill -USR1 25862
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25862 killed at Thu Jun 1 00:02:10 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ----
selfserv starting at Thu Jun 1 00:02:10 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02F -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:02:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 25937 >/dev/null 2>/dev/null
selfserv with PID 25937 found at Thu Jun 1 00:02:10 UTC 2017
selfserv with PID 25937 started at Thu Jun 1 00:02:10 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :C02F \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:02:10 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Thu Jun 1 00:02:12 UTC 2017
ssl.sh: #2659: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 25937 at Thu Jun 1 00:02:12 UTC 2017
kill -USR1 25937
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 25937 killed at Thu Jun 1 00:02:12 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ----
selfserv starting at Thu Jun 1 00:02:13 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:02:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26011 >/dev/null 2>/dev/null
selfserv with PID 26011 found at Thu Jun 1 00:02:13 UTC 2017
selfserv with PID 26011 started at Thu Jun 1 00:02:13 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :C004 -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:02:13 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Thu Jun 1 00:02:15 UTC 2017
ssl.sh: #2660: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 26011 at Thu Jun 1 00:02:15 UTC 2017
kill -USR1 26011
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26011 killed at Thu Jun 1 00:02:15 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ----
selfserv starting at Thu Jun 1 00:02:15 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:02:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26085 >/dev/null 2>/dev/null
selfserv with PID 26085 found at Thu Jun 1 00:02:15 UTC 2017
selfserv with PID 26085 started at Thu Jun 1 00:02:15 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C009 -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:02:15 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Thu Jun 1 00:02:17 UTC 2017
ssl.sh: #2661: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 26085 at Thu Jun 1 00:02:17 UTC 2017
kill -USR1 26085
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26085 killed at Thu Jun 1 00:02:17 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Thu Jun 1 00:02:17 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C009 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:02:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26174 >/dev/null 2>/dev/null
selfserv with PID 26174 found at Thu Jun 1 00:02:17 UTC 2017
selfserv with PID 26174 started at Thu Jun 1 00:02:17 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 10 -C :C009 -N -n ExtendedSSLUser-ec \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:02:17 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Thu Jun 1 00:02:20 UTC 2017
ssl.sh: #2662: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 26174 at Thu Jun 1 00:02:20 UTC 2017
kill -USR1 26174
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26174 killed at Thu Jun 1 00:02:20 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Thu Jun 1 00:02:20 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:02:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26247 >/dev/null 2>/dev/null
selfserv with PID 26247 found at Thu Jun 1 00:02:20 UTC 2017
selfserv with PID 26247 started at Thu Jun 1 00:02:20 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:02:20 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Thu Jun 1 00:02:21 UTC 2017
ssl.sh: #2663: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 26247 at Thu Jun 1 00:02:22 UTC 2017
kill -USR1 26247
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26247 killed at Thu Jun 1 00:02:22 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Thu Jun 1 00:02:22 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C004 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:02:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26321 >/dev/null 2>/dev/null
selfserv with PID 26321 found at Thu Jun 1 00:02:22 UTC 2017
selfserv with PID 26321 started at Thu Jun 1 00:02:22 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 10 -C :C004 -N -n ExtendedSSLUser-ec \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:02:22 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Thu Jun 1 00:02:25 UTC 2017
ssl.sh: #2664: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 26321 at Thu Jun 1 00:02:25 UTC 2017
kill -USR1 26321
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26321 killed at Thu Jun 1 00:02:25 UTC 2017
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Thu Jun 1 00:02:25 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -r -r -c :C00E -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:02:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26394 >/dev/null 2>/dev/null
selfserv with PID 26394 found at Thu Jun 1 00:02:25 UTC 2017
selfserv with PID 26394 started at Thu Jun 1 00:02:25 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 10 -C :C00E -N -n ExtendedSSLUser-ecmixed \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:02:25 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Thu Jun 1 00:02:26 UTC 2017
ssl.sh: #2665: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 26394 at Thu Jun 1 00:02:26 UTC 2017
kill -USR1 26394
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26394 killed at Thu Jun 1 00:02:26 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Thu Jun 1 00:02:26 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:02:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26467 >/dev/null 2>/dev/null
selfserv with PID 26467 found at Thu Jun 1 00:02:26 UTC 2017
selfserv with PID 26467 started at Thu Jun 1 00:02:26 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:02:26 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Thu Jun 1 00:02:28 UTC 2017
ssl.sh: #2666: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 26467 at Thu Jun 1 00:02:28 UTC 2017
kill -USR1 26467
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26467 killed at Thu Jun 1 00:02:28 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Thu Jun 1 00:02:28 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:02:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26541 >/dev/null 2>/dev/null
selfserv with PID 26541 found at Thu Jun 1 00:02:28 UTC 2017
selfserv with PID 26541 started at Thu Jun 1 00:02:28 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n ExtendedSSLUser-ec -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:02:28 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Thu Jun 1 00:02:29 UTC 2017
ssl.sh: #2667: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 26541 at Thu Jun 1 00:02:29 UTC 2017
kill -USR1 26541
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26541 killed at Thu Jun 1 00:02:29 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ----
selfserv starting at Thu Jun 1 00:02:29 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0016 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:02:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26630 >/dev/null 2>/dev/null
selfserv with PID 26630 found at Thu Jun 1 00:02:30 UTC 2017
selfserv with PID 26630 started at Thu Jun 1 00:02:30 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :0016 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:02:30 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Jun 1 00:02:35 UTC 2017
ssl.sh: #2668: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 26630 at Thu Jun 1 00:02:35 UTC 2017
kill -USR1 26630
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26630 killed at Thu Jun 1 00:02:35 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ----
selfserv starting at Thu Jun 1 00:02:36 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0033 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:02:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26703 >/dev/null 2>/dev/null
selfserv with PID 26703 found at Thu Jun 1 00:02:36 UTC 2017
selfserv with PID 26703 started at Thu Jun 1 00:02:36 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :0033 \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:02:36 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Thu Jun 1 00:02:38 UTC 2017
ssl.sh: #2669: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 26703 at Thu Jun 1 00:02:38 UTC 2017
kill -USR1 26703
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26703 killed at Thu Jun 1 00:02:38 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Thu Jun 1 00:02:38 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0039 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:02:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26777 >/dev/null 2>/dev/null
selfserv with PID 26777 found at Thu Jun 1 00:02:38 UTC 2017
selfserv with PID 26777 started at Thu Jun 1 00:02:38 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :0039 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:02:38 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Jun 1 00:02:44 UTC 2017
ssl.sh: #2670: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 26777 at Thu Jun 1 00:02:44 UTC 2017
kill -USR1 26777
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26777 killed at Thu Jun 1 00:02:44 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ----
selfserv starting at Thu Jun 1 00:02:44 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0040 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:02:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26850 >/dev/null 2>/dev/null
selfserv with PID 26850 found at Thu Jun 1 00:02:44 UTC 2017
selfserv with PID 26850 started at Thu Jun 1 00:02:44 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :0040 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:02:44 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Jun 1 00:02:54 UTC 2017
ssl.sh: #2671: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 26850 at Thu Jun 1 00:02:54 UTC 2017
kill -USR1 26850
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26850 killed at Thu Jun 1 00:02:54 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Thu Jun 1 00:02:54 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0038 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:02:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 26933 >/dev/null 2>/dev/null
selfserv with PID 26933 found at Thu Jun 1 00:02:54 UTC 2017
selfserv with PID 26933 started at Thu Jun 1 00:02:54 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :0038 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:02:55 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Jun 1 00:04:25 UTC 2017
ssl.sh: #2672: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 26933 at Thu Jun 1 00:04:25 UTC 2017
kill -USR1 26933
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 26933 killed at Thu Jun 1 00:04:25 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ----
selfserv starting at Thu Jun 1 00:04:25 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006A -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:04:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27323 >/dev/null 2>/dev/null
selfserv with PID 27323 found at Thu Jun 1 00:04:25 UTC 2017
selfserv with PID 27323 started at Thu Jun 1 00:04:25 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :006A -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:04:25 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Jun 1 00:06:00 UTC 2017
ssl.sh: #2673: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 27323 at Thu Jun 1 00:06:00 UTC 2017
kill -USR1 27323
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27323 killed at Thu Jun 1 00:06:00 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ----
selfserv starting at Thu Jun 1 00:06:01 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006B -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:06:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27785 >/dev/null 2>/dev/null
selfserv with PID 27785 found at Thu Jun 1 00:06:01 UTC 2017
selfserv with PID 27785 started at Thu Jun 1 00:06:01 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :006B -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:06:01 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Jun 1 00:06:06 UTC 2017
ssl.sh: #2674: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 27785 at Thu Jun 1 00:06:06 UTC 2017
kill -USR1 27785
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27785 killed at Thu Jun 1 00:06:06 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ----
selfserv starting at Thu Jun 1 00:06:07 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009E -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:06:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27858 >/dev/null 2>/dev/null
selfserv with PID 27858 found at Thu Jun 1 00:06:07 UTC 2017
selfserv with PID 27858 started at Thu Jun 1 00:06:07 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :009E -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:06:07 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Jun 1 00:06:12 UTC 2017
ssl.sh: #2675: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 27858 at Thu Jun 1 00:06:12 UTC 2017
kill -USR1 27858
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27858 killed at Thu Jun 1 00:06:12 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) ----
selfserv starting at Thu Jun 1 00:06:13 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009F -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:06:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 27931 >/dev/null 2>/dev/null
selfserv with PID 27931 found at Thu Jun 1 00:06:13 UTC 2017
selfserv with PID 27931 started at Thu Jun 1 00:06:13 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :009F -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:06:13 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Jun 1 00:06:19 UTC 2017
ssl.sh: #2676: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 27931 at Thu Jun 1 00:06:19 UTC 2017
kill -USR1 27931
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 27931 killed at Thu Jun 1 00:06:19 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ----
selfserv starting at Thu Jun 1 00:06:19 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0032 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:06:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28019 >/dev/null 2>/dev/null
selfserv with PID 28019 found at Thu Jun 1 00:06:19 UTC 2017
selfserv with PID 28019 started at Thu Jun 1 00:06:19 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 100 -C :0032 -N -n ExtendedSSLUser-dsa \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:06:19 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Jun 1 00:06:35 UTC 2017
ssl.sh: #2677: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 28019 at Thu Jun 1 00:06:35 UTC 2017
kill -USR1 28019
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28019 killed at Thu Jun 1 00:06:35 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ----
selfserv starting at Thu Jun 1 00:06:35 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0067 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:06:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28092 >/dev/null 2>/dev/null
selfserv with PID 28092 found at Thu Jun 1 00:06:35 UTC 2017
selfserv with PID 28092 started at Thu Jun 1 00:06:35 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :0067 -n ExtendedSSLUser-dsamixed \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:06:35 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Thu Jun 1 00:06:37 UTC 2017
ssl.sh: #2678: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 28092 at Thu Jun 1 00:06:37 UTC 2017
kill -USR1 28092
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28092 killed at Thu Jun 1 00:06:37 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ----
selfserv starting at Thu Jun 1 00:06:38 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:06:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28181 >/dev/null 2>/dev/null
selfserv with PID 28181 found at Thu Jun 1 00:06:38 UTC 2017
selfserv with PID 28181 started at Thu Jun 1 00:06:38 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :00A2 -N -n ExtendedSSLUser-dsa \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:06:38 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Jun 1 00:09:07 UTC 2017
ssl.sh: #2679: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 28181 at Thu Jun 1 00:09:07 UTC 2017
kill -USR1 28181
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28181 killed at Thu Jun 1 00:09:07 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) ----
selfserv starting at Thu Jun 1 00:09:08 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A3 -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:09:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -B -s -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 28564 >/dev/null 2>/dev/null
selfserv with PID 28564 found at Thu Jun 1 00:09:08 UTC 2017
selfserv with PID 28564 started at Thu Jun 1 00:09:08 UTC 2017
strsclnt -q -p 8443 -d ../ext_client -B -s -w nss -V ssl3:tls1.2 -c 1000 -C :00A3 -N -n ExtendedSSLUser-dsa \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:09:08 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Jun 1 00:11:40 UTC 2017
ssl.sh: #2680: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 28564 at Thu Jun 1 00:11:40 UTC 2017
kill -USR1 28564
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 28564 killed at Thu Jun 1 00:11:40 UTC 2017
ssl.sh: SSL - FIPS mode on for server ===============================
ssl.sh: Turning FIPS on for the server
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server -fips true -force
FIPS mode enabled.
ssl.sh: #2681: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/server -list
ssl.sh: #2682: (modutil -list) produced a returncode of 0, expected is 0 - PASSED
1. NSS Internal FIPS PKCS #11 Module
ssl.sh: #2683: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED
ssl.sh: Turning FIPS on for the extended server
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_server -fips true -force
FIPS mode enabled.
ssl.sh: #2684: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED
modutil -dbdir /<<PKGBUILDDIR>>/tests_results/security/testwandboard.1/ext_server -list
ssl.sh: #2685: (modutil -list) produced a returncode of 0, expected is 0 - PASSED
1. NSS Internal FIPS PKCS #11 Module
ssl.sh: #2686: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED
ssl.sh: SSL Cipher Coverage - server fips/client normal - with ECC ===============================
selfserv starting at Thu Jun 1 00:11:43 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:11:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:43 UTC 2017
selfserv with PID 29050 started at Thu Jun 1 00:11:43 UTC 2017
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:ssl3 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2687: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:ssl3 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2688: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:ssl3 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2689: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:ssl3 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2690: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:ssl3 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2691: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:ssl3 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2692: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only)
ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:ssl3 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2693: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:ssl3 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2694: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:ssl3 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2695: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:ssl3 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2696: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009F -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2697: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A3 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2698: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009D -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2699: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2700: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2701: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2702: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2703: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2704: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2705: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only)
ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2706: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2707: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2708: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2709: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2710: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2711: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2712: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping f TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping g TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2713: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2714: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2715: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only)
ssl.sh: skipping TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2716: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2717: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2718: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2719: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2720: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2721: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2722: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2723: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2724: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2725: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping l TLS12_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only)
ssl.sh: skipping m TLS12_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only)
ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2726: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2727: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2728: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2729: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0016 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2730: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0032 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2731: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0033 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2732: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0038 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2733: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0039 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2734: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003B -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2735: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003C -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2736: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003D -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2737: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0040 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2738: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:11:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0067 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2739: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:12:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006A -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2740: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:12:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006B -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2741: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:12:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009C -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2742: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:12:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009E -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2743: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:12:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A2 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2744: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:12:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCAA -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2745: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:12:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2746: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:12:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2747: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:12:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2748: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:12:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2749: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:12:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2750: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:12:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2751: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:12:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2752: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:12:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2753: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:12:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2754: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 29050 >/dev/null 2>/dev/null
selfserv with PID 29050 found at Thu Jun 1 00:12:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2755: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 29050 at Thu Jun 1 00:12:06 UTC 2017
kill -USR1 29050
selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 29050 killed at Thu Jun 1 00:12:06 UTC 2017
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Jun 1 00:12:06 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:12:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30685 >/dev/null 2>/dev/null
selfserv with PID 30685 found at Thu Jun 1 00:12:06 UTC 2017
selfserv with PID 30685 started at Thu Jun 1 00:12:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2756: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30685 >/dev/null 2>/dev/null
selfserv with PID 30685 found at Thu Jun 1 00:12:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2757: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30685 >/dev/null 2>/dev/null
selfserv with PID 30685 found at Thu Jun 1 00:12:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2758: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30685 >/dev/null 2>/dev/null
selfserv with PID 30685 found at Thu Jun 1 00:12:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2759: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30685 >/dev/null 2>/dev/null
selfserv with PID 30685 found at Thu Jun 1 00:12:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2760: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 30685 at Thu Jun 1 00:12:09 UTC 2017
kill -USR1 30685
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30685 killed at Thu Jun 1 00:12:09 UTC 2017
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Jun 1 00:12:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:12:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 30823 >/dev/null 2>/dev/null
selfserv with PID 30823 found at Thu Jun 1 00:12:09 UTC 2017
selfserv with PID 30823 started at Thu Jun 1 00:12:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2761: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 30823 >/dev/null 2>/dev/null
selfserv with PID 30823 found at Thu Jun 1 00:12:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2762: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30823 >/dev/null 2>/dev/null
selfserv with PID 30823 found at Thu Jun 1 00:12:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2763: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30823 >/dev/null 2>/dev/null
selfserv with PID 30823 found at Thu Jun 1 00:12:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2764: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30823 >/dev/null 2>/dev/null
selfserv with PID 30823 found at Thu Jun 1 00:12:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.0 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2765: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 30823 >/dev/null 2>/dev/null
selfserv with PID 30823 found at Thu Jun 1 00:12:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2766: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 30823 >/dev/null 2>/dev/null
selfserv with PID 30823 found at Thu Jun 1 00:12:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2767: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30823 >/dev/null 2>/dev/null
selfserv with PID 30823 found at Thu Jun 1 00:12:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2768: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30823 >/dev/null 2>/dev/null
selfserv with PID 30823 found at Thu Jun 1 00:12:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2769: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30823 >/dev/null 2>/dev/null
selfserv with PID 30823 found at Thu Jun 1 00:12:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2770: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 30823 >/dev/null 2>/dev/null
selfserv with PID 30823 found at Thu Jun 1 00:12:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2771: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 30823 >/dev/null 2>/dev/null
selfserv with PID 30823 found at Thu Jun 1 00:12:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2772: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 30823 >/dev/null 2>/dev/null
selfserv with PID 30823 found at Thu Jun 1 00:12:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2773: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 30823 >/dev/null 2>/dev/null
selfserv with PID 30823 found at Thu Jun 1 00:12:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2774: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 30823 >/dev/null 2>/dev/null
selfserv with PID 30823 found at Thu Jun 1 00:12:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2775: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 30823 at Thu Jun 1 00:12:16 UTC 2017
kill -USR1 30823
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 30823 killed at Thu Jun 1 00:12:16 UTC 2017
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Jun 1 00:12:16 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:12:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31176 >/dev/null 2>/dev/null
selfserv with PID 31176 found at Thu Jun 1 00:12:16 UTC 2017
selfserv with PID 31176 started at Thu Jun 1 00:12:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2776: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 31176 >/dev/null 2>/dev/null
selfserv with PID 31176 found at Thu Jun 1 00:12:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2777: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31176 >/dev/null 2>/dev/null
selfserv with PID 31176 found at Thu Jun 1 00:12:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2778: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31176 >/dev/null 2>/dev/null
selfserv with PID 31176 found at Thu Jun 1 00:12:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2779: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31176 >/dev/null 2>/dev/null
selfserv with PID 31176 found at Thu Jun 1 00:12:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2780: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 31176 at Thu Jun 1 00:12:19 UTC 2017
kill -USR1 31176
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31176 killed at Thu Jun 1 00:12:19 UTC 2017
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Jun 1 00:12:19 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:12:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31314 >/dev/null 2>/dev/null
selfserv with PID 31314 found at Thu Jun 1 00:12:19 UTC 2017
selfserv with PID 31314 started at Thu Jun 1 00:12:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2781: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 31314 >/dev/null 2>/dev/null
selfserv with PID 31314 found at Thu Jun 1 00:12:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2782: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31314 >/dev/null 2>/dev/null
selfserv with PID 31314 found at Thu Jun 1 00:12:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2783: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31314 >/dev/null 2>/dev/null
selfserv with PID 31314 found at Thu Jun 1 00:12:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2784: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31314 >/dev/null 2>/dev/null
selfserv with PID 31314 found at Thu Jun 1 00:12:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.1 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2785: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 31314 >/dev/null 2>/dev/null
selfserv with PID 31314 found at Thu Jun 1 00:12:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2786: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 31314 >/dev/null 2>/dev/null
selfserv with PID 31314 found at Thu Jun 1 00:12:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2787: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31314 >/dev/null 2>/dev/null
selfserv with PID 31314 found at Thu Jun 1 00:12:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2788: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31314 >/dev/null 2>/dev/null
selfserv with PID 31314 found at Thu Jun 1 00:12:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2789: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31314 >/dev/null 2>/dev/null
selfserv with PID 31314 found at Thu Jun 1 00:12:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2790: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 31314 >/dev/null 2>/dev/null
selfserv with PID 31314 found at Thu Jun 1 00:12:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2791: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 31314 >/dev/null 2>/dev/null
selfserv with PID 31314 found at Thu Jun 1 00:12:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2792: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31314 >/dev/null 2>/dev/null
selfserv with PID 31314 found at Thu Jun 1 00:12:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2793: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31314 >/dev/null 2>/dev/null
selfserv with PID 31314 found at Thu Jun 1 00:12:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2794: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31314 >/dev/null 2>/dev/null
selfserv with PID 31314 found at Thu Jun 1 00:12:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2795: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 31314 at Thu Jun 1 00:12:26 UTC 2017
kill -USR1 31314
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31314 killed at Thu Jun 1 00:12:26 UTC 2017
ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Jun 1 00:12:26 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:12:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31668 >/dev/null 2>/dev/null
selfserv with PID 31668 found at Thu Jun 1 00:12:26 UTC 2017
selfserv with PID 31668 started at Thu Jun 1 00:12:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2796: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 31668 >/dev/null 2>/dev/null
selfserv with PID 31668 found at Thu Jun 1 00:12:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2797: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31668 >/dev/null 2>/dev/null
selfserv with PID 31668 found at Thu Jun 1 00:12:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2798: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31668 >/dev/null 2>/dev/null
selfserv with PID 31668 found at Thu Jun 1 00:12:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2799: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31668 >/dev/null 2>/dev/null
selfserv with PID 31668 found at Thu Jun 1 00:12:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2800: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 31668 at Thu Jun 1 00:12:28 UTC 2017
kill -USR1 31668
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31668 killed at Thu Jun 1 00:12:29 UTC 2017
ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Jun 1 00:12:29 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:12:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 31806 >/dev/null 2>/dev/null
selfserv with PID 31806 found at Thu Jun 1 00:12:29 UTC 2017
selfserv with PID 31806 started at Thu Jun 1 00:12:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2801: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 31806 >/dev/null 2>/dev/null
selfserv with PID 31806 found at Thu Jun 1 00:12:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2802: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 31806 >/dev/null 2>/dev/null
selfserv with PID 31806 found at Thu Jun 1 00:12:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2803: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 31806 >/dev/null 2>/dev/null
selfserv with PID 31806 found at Thu Jun 1 00:12:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2804: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 31806 >/dev/null 2>/dev/null
selfserv with PID 31806 found at Thu Jun 1 00:12:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2805: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 31806 >/dev/null 2>/dev/null
selfserv with PID 31806 found at Thu Jun 1 00:12:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C023 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2806: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 31806 >/dev/null 2>/dev/null
selfserv with PID 31806 found at Thu Jun 1 00:12:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C024 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2807: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 31806 >/dev/null 2>/dev/null
selfserv with PID 31806 found at Thu Jun 1 00:12:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C027 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2808: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 31806 >/dev/null 2>/dev/null
selfserv with PID 31806 found at Thu Jun 1 00:12:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C028 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2809: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 31806 >/dev/null 2>/dev/null
selfserv with PID 31806 found at Thu Jun 1 00:12:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02B -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2810: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 31806 >/dev/null 2>/dev/null
selfserv with PID 31806 found at Thu Jun 1 00:12:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02C -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2811: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 31806 >/dev/null 2>/dev/null
selfserv with PID 31806 found at Thu Jun 1 00:12:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02F -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2812: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 31806 >/dev/null 2>/dev/null
selfserv with PID 31806 found at Thu Jun 1 00:12:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C030 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2813: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 31806 >/dev/null 2>/dev/null
selfserv with PID 31806 found at Thu Jun 1 00:12:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA8 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2814: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 31806 >/dev/null 2>/dev/null
selfserv with PID 31806 found at Thu Jun 1 00:12:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA9 -V ssl3:tls1.2 \
-f -d ../client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2815: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 31806 at Thu Jun 1 00:12:35 UTC 2017
kill -USR1 31806
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 31806 killed at Thu Jun 1 00:12:35 UTC 2017
ssl.sh: SSL Client Authentication - server fips/client normal - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Thu Jun 1 00:12:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:12:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32207 >/dev/null 2>/dev/null
selfserv with PID 32207 found at Thu Jun 1 00:12:35 UTC 2017
selfserv with PID 32207 started at Thu Jun 1 00:12:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2816: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32207 at Thu Jun 1 00:12:37 UTC 2017
kill -USR1 32207
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32207 killed at Thu Jun 1 00:12:37 UTC 2017
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Thu Jun 1 00:12:37 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:12:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32264 >/dev/null 2>/dev/null
selfserv with PID 32264 found at Thu Jun 1 00:12:37 UTC 2017
selfserv with PID 32264 started at Thu Jun 1 00:12:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2817: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32264 at Thu Jun 1 00:12:39 UTC 2017
kill -USR1 32264
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32264 killed at Thu Jun 1 00:12:39 UTC 2017
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Thu Jun 1 00:12:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:12:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32321 >/dev/null 2>/dev/null
selfserv with PID 32321 found at Thu Jun 1 00:12:39 UTC 2017
selfserv with PID 32321 started at Thu Jun 1 00:12:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2818: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32321 at Thu Jun 1 00:12:41 UTC 2017
kill -USR1 32321
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32321 killed at Thu Jun 1 00:12:41 UTC 2017
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Thu Jun 1 00:12:41 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:12:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32378 >/dev/null 2>/dev/null
selfserv with PID 32378 found at Thu Jun 1 00:12:41 UTC 2017
selfserv with PID 32378 started at Thu Jun 1 00:12:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2819: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32378 at Thu Jun 1 00:12:43 UTC 2017
kill -USR1 32378
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32378 killed at Thu Jun 1 00:12:43 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Thu Jun 1 00:12:43 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:12:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32435 >/dev/null 2>/dev/null
selfserv with PID 32435 found at Thu Jun 1 00:12:43 UTC 2017
selfserv with PID 32435 started at Thu Jun 1 00:12:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2820: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32435 at Thu Jun 1 00:12:44 UTC 2017
kill -USR1 32435
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32435 killed at Thu Jun 1 00:12:44 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Thu Jun 1 00:12:44 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:12:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32492 >/dev/null 2>/dev/null
selfserv with PID 32492 found at Thu Jun 1 00:12:45 UTC 2017
selfserv with PID 32492 started at Thu Jun 1 00:12:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2821: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32492 at Thu Jun 1 00:12:46 UTC 2017
kill -USR1 32492
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32492 killed at Thu Jun 1 00:12:46 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Thu Jun 1 00:12:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:12:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32549 >/dev/null 2>/dev/null
selfserv with PID 32549 found at Thu Jun 1 00:12:46 UTC 2017
selfserv with PID 32549 started at Thu Jun 1 00:12:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2822: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32549 at Thu Jun 1 00:12:48 UTC 2017
kill -USR1 32549
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32549 killed at Thu Jun 1 00:12:48 UTC 2017
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Thu Jun 1 00:12:48 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:12:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32606 >/dev/null 2>/dev/null
selfserv with PID 32606 found at Thu Jun 1 00:12:48 UTC 2017
selfserv with PID 32606 started at Thu Jun 1 00:12:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2823: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32606 at Thu Jun 1 00:12:50 UTC 2017
kill -USR1 32606
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32606 killed at Thu Jun 1 00:12:50 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Thu Jun 1 00:12:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:12:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32663 >/dev/null 2>/dev/null
selfserv with PID 32663 found at Thu Jun 1 00:12:50 UTC 2017
selfserv with PID 32663 started at Thu Jun 1 00:12:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2824: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 32663 at Thu Jun 1 00:12:51 UTC 2017
kill -USR1 32663
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32663 killed at Thu Jun 1 00:12:51 UTC 2017
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Thu Jun 1 00:12:52 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:12:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 32720 >/dev/null 2>/dev/null
selfserv with PID 32720 found at Thu Jun 1 00:12:52 UTC 2017
selfserv with PID 32720 started at Thu Jun 1 00:12:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2825: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 32720 at Thu Jun 1 00:12:53 UTC 2017
kill -USR1 32720
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 32720 killed at Thu Jun 1 00:12:53 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Thu Jun 1 00:12:53 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:12:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 309 >/dev/null 2>/dev/null
selfserv with PID 309 found at Thu Jun 1 00:12:53 UTC 2017
selfserv with PID 309 started at Thu Jun 1 00:12:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2826: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 309 at Thu Jun 1 00:12:55 UTC 2017
kill -USR1 309
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 309 killed at Thu Jun 1 00:12:55 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Thu Jun 1 00:12:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:12:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 370 >/dev/null 2>/dev/null
selfserv with PID 370 found at Thu Jun 1 00:12:55 UTC 2017
selfserv with PID 370 started at Thu Jun 1 00:12:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2827: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 370 at Thu Jun 1 00:12:57 UTC 2017
kill -USR1 370
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 370 killed at Thu Jun 1 00:12:57 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Jun 1 00:12:57 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:12:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 429 >/dev/null 2>/dev/null
selfserv with PID 429 found at Thu Jun 1 00:12:57 UTC 2017
selfserv with PID 429 started at Thu Jun 1 00:12:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2828: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 429 at Thu Jun 1 00:12:58 UTC 2017
kill -USR1 429
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 429 killed at Thu Jun 1 00:12:58 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Jun 1 00:12:59 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:12:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 487 >/dev/null 2>/dev/null
selfserv with PID 487 found at Thu Jun 1 00:12:59 UTC 2017
selfserv with PID 487 started at Thu Jun 1 00:12:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2829: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 487 at Thu Jun 1 00:13:00 UTC 2017
kill -USR1 487
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 487 killed at Thu Jun 1 00:13:00 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Jun 1 00:13:01 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:13:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 549 >/dev/null 2>/dev/null
selfserv with PID 549 found at Thu Jun 1 00:13:01 UTC 2017
selfserv with PID 549 started at Thu Jun 1 00:13:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2830: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 549 at Thu Jun 1 00:13:02 UTC 2017
kill -USR1 549
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 549 killed at Thu Jun 1 00:13:02 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Jun 1 00:13:03 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:13:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 615 >/dev/null 2>/dev/null
selfserv with PID 615 found at Thu Jun 1 00:13:03 UTC 2017
selfserv with PID 615 started at Thu Jun 1 00:13:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2831: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 615 at Thu Jun 1 00:13:05 UTC 2017
kill -USR1 615
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 615 killed at Thu Jun 1 00:13:05 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Jun 1 00:13:05 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:13:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 860 >/dev/null 2>/dev/null
selfserv with PID 860 found at Thu Jun 1 00:13:05 UTC 2017
selfserv with PID 860 started at Thu Jun 1 00:13:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2832: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 860 at Thu Jun 1 00:13:07 UTC 2017
kill -USR1 860
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 860 killed at Thu Jun 1 00:13:07 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Jun 1 00:13:07 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:13:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1027 >/dev/null 2>/dev/null
selfserv with PID 1027 found at Thu Jun 1 00:13:07 UTC 2017
selfserv with PID 1027 started at Thu Jun 1 00:13:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2833: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1027 at Thu Jun 1 00:13:09 UTC 2017
kill -USR1 1027
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1027 killed at Thu Jun 1 00:13:09 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Jun 1 00:13:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:13:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1089 >/dev/null 2>/dev/null
selfserv with PID 1089 found at Thu Jun 1 00:13:09 UTC 2017
selfserv with PID 1089 started at Thu Jun 1 00:13:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2834: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1089 at Thu Jun 1 00:13:11 UTC 2017
kill -USR1 1089
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1089 killed at Thu Jun 1 00:13:11 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Jun 1 00:13:11 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:13:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1146 >/dev/null 2>/dev/null
selfserv with PID 1146 found at Thu Jun 1 00:13:11 UTC 2017
selfserv with PID 1146 started at Thu Jun 1 00:13:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2835: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1146 at Thu Jun 1 00:13:13 UTC 2017
kill -USR1 1146
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1146 killed at Thu Jun 1 00:13:13 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Jun 1 00:13:13 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:13:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1203 >/dev/null 2>/dev/null
selfserv with PID 1203 found at Thu Jun 1 00:13:13 UTC 2017
selfserv with PID 1203 started at Thu Jun 1 00:13:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2836: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1203 at Thu Jun 1 00:13:15 UTC 2017
kill -USR1 1203
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1203 killed at Thu Jun 1 00:13:15 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Jun 1 00:13:16 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:13:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1260 >/dev/null 2>/dev/null
selfserv with PID 1260 found at Thu Jun 1 00:13:16 UTC 2017
selfserv with PID 1260 started at Thu Jun 1 00:13:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2837: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1260 at Thu Jun 1 00:13:17 UTC 2017
kill -USR1 1260
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1260 killed at Thu Jun 1 00:13:17 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Jun 1 00:13:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:13:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1317 >/dev/null 2>/dev/null
selfserv with PID 1317 found at Thu Jun 1 00:13:18 UTC 2017
selfserv with PID 1317 started at Thu Jun 1 00:13:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2838: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1317 at Thu Jun 1 00:13:20 UTC 2017
kill -USR1 1317
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1317 killed at Thu Jun 1 00:13:20 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Jun 1 00:13:20 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:13:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1374 >/dev/null 2>/dev/null
selfserv with PID 1374 found at Thu Jun 1 00:13:20 UTC 2017
selfserv with PID 1374 started at Thu Jun 1 00:13:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2839: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1374 at Thu Jun 1 00:13:22 UTC 2017
kill -USR1 1374
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1374 killed at Thu Jun 1 00:13:22 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Jun 1 00:13:22 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:13:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1431 >/dev/null 2>/dev/null
selfserv with PID 1431 found at Thu Jun 1 00:13:22 UTC 2017
selfserv with PID 1431 started at Thu Jun 1 00:13:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2840: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1431 at Thu Jun 1 00:13:24 UTC 2017
kill -USR1 1431
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1431 killed at Thu Jun 1 00:13:24 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Jun 1 00:13:24 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:13:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1488 >/dev/null 2>/dev/null
selfserv with PID 1488 found at Thu Jun 1 00:13:24 UTC 2017
selfserv with PID 1488 started at Thu Jun 1 00:13:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2841: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1488 at Thu Jun 1 00:13:26 UTC 2017
kill -USR1 1488
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1488 killed at Thu Jun 1 00:13:26 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Jun 1 00:13:26 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:13:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1545 >/dev/null 2>/dev/null
selfserv with PID 1545 found at Thu Jun 1 00:13:26 UTC 2017
selfserv with PID 1545 started at Thu Jun 1 00:13:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2842: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1545 at Thu Jun 1 00:13:28 UTC 2017
kill -USR1 1545
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1545 killed at Thu Jun 1 00:13:28 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Jun 1 00:13:28 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:13:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1602 >/dev/null 2>/dev/null
selfserv with PID 1602 found at Thu Jun 1 00:13:28 UTC 2017
selfserv with PID 1602 started at Thu Jun 1 00:13:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2843: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1602 at Thu Jun 1 00:13:29 UTC 2017
kill -USR1 1602
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1602 killed at Thu Jun 1 00:13:29 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Jun 1 00:13:30 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:13:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1659 >/dev/null 2>/dev/null
selfserv with PID 1659 found at Thu Jun 1 00:13:30 UTC 2017
selfserv with PID 1659 started at Thu Jun 1 00:13:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2844: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1659 at Thu Jun 1 00:13:31 UTC 2017
kill -USR1 1659
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1659 killed at Thu Jun 1 00:13:31 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Jun 1 00:13:31 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:13:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1716 >/dev/null 2>/dev/null
selfserv with PID 1716 found at Thu Jun 1 00:13:32 UTC 2017
selfserv with PID 1716 started at Thu Jun 1 00:13:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2845: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1716 at Thu Jun 1 00:13:33 UTC 2017
kill -USR1 1716
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1716 killed at Thu Jun 1 00:13:33 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Thu Jun 1 00:13:34 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:13:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1788 >/dev/null 2>/dev/null
selfserv with PID 1788 found at Thu Jun 1 00:13:34 UTC 2017
selfserv with PID 1788 started at Thu Jun 1 00:13:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2846: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1788 at Thu Jun 1 00:13:35 UTC 2017
kill -USR1 1788
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1788 killed at Thu Jun 1 00:13:35 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Thu Jun 1 00:13:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:13:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1845 >/dev/null 2>/dev/null
selfserv with PID 1845 found at Thu Jun 1 00:13:35 UTC 2017
selfserv with PID 1845 started at Thu Jun 1 00:13:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2847: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1845 at Thu Jun 1 00:13:37 UTC 2017
kill -USR1 1845
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1845 killed at Thu Jun 1 00:13:37 UTC 2017
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Thu Jun 1 00:13:37 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:13:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1902 >/dev/null 2>/dev/null
selfserv with PID 1902 found at Thu Jun 1 00:13:37 UTC 2017
selfserv with PID 1902 started at Thu Jun 1 00:13:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2848: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 1902 at Thu Jun 1 00:13:39 UTC 2017
kill -USR1 1902
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1902 killed at Thu Jun 1 00:13:39 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Thu Jun 1 00:13:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:13:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 1959 >/dev/null 2>/dev/null
selfserv with PID 1959 found at Thu Jun 1 00:13:39 UTC 2017
selfserv with PID 1959 started at Thu Jun 1 00:13:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2849: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 1959 at Thu Jun 1 00:13:41 UTC 2017
kill -USR1 1959
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 1959 killed at Thu Jun 1 00:13:41 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ----
selfserv starting at Thu Jun 1 00:13:41 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:13:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2016 >/dev/null 2>/dev/null
selfserv with PID 2016 found at Thu Jun 1 00:13:41 UTC 2017
selfserv with PID 2016 started at Thu Jun 1 00:13:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2850: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2016 at Thu Jun 1 00:13:43 UTC 2017
kill -USR1 2016
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2016 killed at Thu Jun 1 00:13:43 UTC 2017
ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ----
selfserv starting at Thu Jun 1 00:13:43 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:13:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2095 >/dev/null 2>/dev/null
selfserv with PID 2095 found at Thu Jun 1 00:13:43 UTC 2017
selfserv with PID 2095 started at Thu Jun 1 00:13:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2851: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2095 at Thu Jun 1 00:13:44 UTC 2017
kill -USR1 2095
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2095 killed at Thu Jun 1 00:13:44 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (bad password) ----
selfserv starting at Thu Jun 1 00:13:45 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:13:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2152 >/dev/null 2>/dev/null
selfserv with PID 2152 found at Thu Jun 1 00:13:45 UTC 2017
selfserv with PID 2152 started at Thu Jun 1 00:13:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #2852: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2152 at Thu Jun 1 00:13:46 UTC 2017
kill -USR1 2152
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2152 killed at Thu Jun 1 00:13:46 UTC 2017
ssl.sh: SSL3 Require client auth (EC) (client auth) ----
selfserv starting at Thu Jun 1 00:13:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:13:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2209 >/dev/null 2>/dev/null
selfserv with PID 2209 found at Thu Jun 1 00:13:46 UTC 2017
selfserv with PID 2209 started at Thu Jun 1 00:13:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2853: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2209 at Thu Jun 1 00:13:48 UTC 2017
kill -USR1 2209
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2209 killed at Thu Jun 1 00:13:48 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Jun 1 00:13:48 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:13:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2266 >/dev/null 2>/dev/null
selfserv with PID 2266 found at Thu Jun 1 00:13:48 UTC 2017
selfserv with PID 2266 started at Thu Jun 1 00:13:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2854: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2266 at Thu Jun 1 00:13:50 UTC 2017
kill -USR1 2266
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2266 killed at Thu Jun 1 00:13:50 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Jun 1 00:13:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:13:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2323 >/dev/null 2>/dev/null
selfserv with PID 2323 found at Thu Jun 1 00:13:50 UTC 2017
selfserv with PID 2323 started at Thu Jun 1 00:13:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2855: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2323 at Thu Jun 1 00:13:52 UTC 2017
kill -USR1 2323
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2323 killed at Thu Jun 1 00:13:52 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Jun 1 00:13:52 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:13:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2380 >/dev/null 2>/dev/null
selfserv with PID 2380 found at Thu Jun 1 00:13:52 UTC 2017
selfserv with PID 2380 started at Thu Jun 1 00:13:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w bogus -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2856: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2380 at Thu Jun 1 00:13:54 UTC 2017
kill -USR1 2380
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2380 killed at Thu Jun 1 00:13:54 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Jun 1 00:13:54 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:13:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2439 >/dev/null 2>/dev/null
selfserv with PID 2439 found at Thu Jun 1 00:13:54 UTC 2017
selfserv with PID 2439 started at Thu Jun 1 00:13:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2857: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2439 at Thu Jun 1 00:13:56 UTC 2017
kill -USR1 2439
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2439 killed at Thu Jun 1 00:13:56 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Jun 1 00:13:56 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:13:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2500 >/dev/null 2>/dev/null
selfserv with PID 2500 found at Thu Jun 1 00:13:56 UTC 2017
selfserv with PID 2500 started at Thu Jun 1 00:13:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2858: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2500 at Thu Jun 1 00:13:58 UTC 2017
kill -USR1 2500
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2500 killed at Thu Jun 1 00:13:58 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Jun 1 00:13:58 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:13:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2558 >/dev/null 2>/dev/null
selfserv with PID 2558 found at Thu Jun 1 00:13:58 UTC 2017
selfserv with PID 2558 started at Thu Jun 1 00:13:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2859: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2558 at Thu Jun 1 00:14:01 UTC 2017
kill -USR1 2558
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2558 killed at Thu Jun 1 00:14:01 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Jun 1 00:14:01 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:14:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2615 >/dev/null 2>/dev/null
selfserv with PID 2615 found at Thu Jun 1 00:14:01 UTC 2017
selfserv with PID 2615 started at Thu Jun 1 00:14:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w bogus -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2860: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2615 at Thu Jun 1 00:14:03 UTC 2017
kill -USR1 2615
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2615 killed at Thu Jun 1 00:14:03 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Jun 1 00:14:03 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:14:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2673 >/dev/null 2>/dev/null
selfserv with PID 2673 found at Thu Jun 1 00:14:03 UTC 2017
selfserv with PID 2673 started at Thu Jun 1 00:14:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.0 -w nss -n TestUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2861: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2673 at Thu Jun 1 00:14:05 UTC 2017
kill -USR1 2673
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2673 killed at Thu Jun 1 00:14:05 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Jun 1 00:14:05 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:14:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2730 >/dev/null 2>/dev/null
selfserv with PID 2730 found at Thu Jun 1 00:14:05 UTC 2017
selfserv with PID 2730 started at Thu Jun 1 00:14:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2862: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2730 at Thu Jun 1 00:14:07 UTC 2017
kill -USR1 2730
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2730 killed at Thu Jun 1 00:14:07 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Jun 1 00:14:07 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:14:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2788 >/dev/null 2>/dev/null
selfserv with PID 2788 found at Thu Jun 1 00:14:07 UTC 2017
selfserv with PID 2788 started at Thu Jun 1 00:14:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2863: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2788 at Thu Jun 1 00:14:09 UTC 2017
kill -USR1 2788
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2788 killed at Thu Jun 1 00:14:09 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ----
selfserv starting at Thu Jun 1 00:14:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:14:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2847 >/dev/null 2>/dev/null
selfserv with PID 2847 found at Thu Jun 1 00:14:09 UTC 2017
selfserv with PID 2847 started at Thu Jun 1 00:14:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser-ec -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #2864: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 2847 at Thu Jun 1 00:14:11 UTC 2017
kill -USR1 2847
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2847 killed at Thu Jun 1 00:14:11 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ----
selfserv starting at Thu Jun 1 00:14:11 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:14:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2905 >/dev/null 2>/dev/null
selfserv with PID 2905 found at Thu Jun 1 00:14:11 UTC 2017
selfserv with PID 2905 started at Thu Jun 1 00:14:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -n TestUser-ec -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2865: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2905 at Thu Jun 1 00:14:13 UTC 2017
kill -USR1 2905
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2905 killed at Thu Jun 1 00:14:13 UTC 2017
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Thu Jun 1 00:14:13 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:14:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 2983 >/dev/null 2>/dev/null
selfserv with PID 2983 found at Thu Jun 1 00:14:13 UTC 2017
selfserv with PID 2983 started at Thu Jun 1 00:14:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2866: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 2983 at Thu Jun 1 00:14:15 UTC 2017
kill -USR1 2983
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 2983 killed at Thu Jun 1 00:14:15 UTC 2017
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Thu Jun 1 00:14:15 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:14:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3046 >/dev/null 2>/dev/null
selfserv with PID 3046 found at Thu Jun 1 00:14:15 UTC 2017
selfserv with PID 3046 started at Thu Jun 1 00:14:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -c v -w nss -n TestUser -a testwandboard-sni.(none) < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=testwandboard-sni.(none),E=testwandboard-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2867: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3046 at Thu Jun 1 00:14:16 UTC 2017
kill -USR1 3046
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3046 killed at Thu Jun 1 00:14:16 UTC 2017
ssl.sh: TLS Server response with alert ----
selfserv starting at Thu Jun 1 00:14:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:14:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3109 >/dev/null 2>/dev/null
selfserv with PID 3109 found at Thu Jun 1 00:14:17 UTC 2017
selfserv with PID 3109 started at Thu Jun 1 00:14:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -c v -w nss -n TestUser -a testwandboard-sni1.(none) < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2868: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3109 at Thu Jun 1 00:14:18 UTC 2017
kill -USR1 3109
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3109 killed at Thu Jun 1 00:14:18 UTC 2017
ssl.sh: SSL3 Server hello response without SNI ----
selfserv starting at Thu Jun 1 00:14:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:14:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3172 >/dev/null 2>/dev/null
selfserv with PID 3172 found at Thu Jun 1 00:14:18 UTC 2017
selfserv with PID 3172 started at Thu Jun 1 00:14:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -w nss -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2869: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3172 at Thu Jun 1 00:14:20 UTC 2017
kill -USR1 3172
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3172 killed at Thu Jun 1 00:14:20 UTC 2017
ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ----
selfserv starting at Thu Jun 1 00:14:20 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:14:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3235 >/dev/null 2>/dev/null
selfserv with PID 3235 found at Thu Jun 1 00:14:20 UTC 2017
selfserv with PID 3235 started at Thu Jun 1 00:14:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:ssl3 -c v -w nss -n TestUser -a testwandboard-sni.(none) < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
ssl.sh: #2870: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3235 at Thu Jun 1 00:14:21 UTC 2017
kill -USR1 3235
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3235 killed at Thu Jun 1 00:14:21 UTC 2017
ssl.sh: TLS Server hello response without SNI ----
selfserv starting at Thu Jun 1 00:14:22 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:14:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3298 >/dev/null 2>/dev/null
selfserv with PID 3298 found at Thu Jun 1 00:14:22 UTC 2017
selfserv with PID 3298 started at Thu Jun 1 00:14:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2871: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3298 at Thu Jun 1 00:14:23 UTC 2017
kill -USR1 3298
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3298 killed at Thu Jun 1 00:14:23 UTC 2017
ssl.sh: TLS Server hello response with SNI ----
selfserv starting at Thu Jun 1 00:14:24 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:14:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3362 >/dev/null 2>/dev/null
selfserv with PID 3362 found at Thu Jun 1 00:14:24 UTC 2017
selfserv with PID 3362 started at Thu Jun 1 00:14:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -c v -w nss -n TestUser -a testwandboard-sni.(none) < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=testwandboard-sni.(none),E=testwandboard-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=testwandboard-sni.(none),E=testwandboard-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2872: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 3362 at Thu Jun 1 00:14:25 UTC 2017
kill -USR1 3362
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3362 killed at Thu Jun 1 00:14:25 UTC 2017
ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ----
selfserv starting at Thu Jun 1 00:14:25 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:14:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3425 >/dev/null 2>/dev/null
selfserv with PID 3425 found at Thu Jun 1 00:14:25 UTC 2017
selfserv with PID 3425 started at Thu Jun 1 00:14:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -w nss -n TestUser -a testwandboard-sni.(none) -a testwandboard.(none) < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate.
tstclnt: exiting with return code 254
selfserv: HDX PR_Read returned error -12271:
SSL peer cannot verify your certificate.
ssl.sh: #2873: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3425 at Thu Jun 1 00:14:27 UTC 2017
kill -USR1 3425
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3425 killed at Thu Jun 1 00:14:27 UTC 2017
ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ----
selfserv starting at Thu Jun 1 00:14:27 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:14:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3490 >/dev/null 2>/dev/null
selfserv with PID 3490 found at Thu Jun 1 00:14:27 UTC 2017
selfserv with PID 3490 started at Thu Jun 1 00:14:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -c v -w nss -n TestUser -a testwandboard-sni.(none) -a testwandboard-sni1.(none) < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=testwandboard-sni.(none),E=testwandboard-sni.(none)@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 1
ssl.sh: #2874: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3490 at Thu Jun 1 00:14:28 UTC 2017
kill -USR1 3490
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3490 killed at Thu Jun 1 00:14:28 UTC 2017
ssl.sh: TLS Server response with alert ----
selfserv starting at Thu Jun 1 00:14:29 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:14:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3554 >/dev/null 2>/dev/null
selfserv with PID 3554 found at Thu Jun 1 00:14:29 UTC 2017
selfserv with PID 3554 started at Thu Jun 1 00:14:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../client -v \
-V ssl3:tls1.2 -c v -w nss -n TestUser -a testwandboard-sni1.(none) < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12182:
SSL peer has no certificate for the requested DNS name.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name.
tstclnt: exiting with return code 254
ssl.sh: #2875: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 3554 at Thu Jun 1 00:14:30 UTC 2017
kill -USR1 3554
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3554 killed at Thu Jun 1 00:14:30 UTC 2017
./ssl.sh: line 1071: [: -nz: unary operator expected
ssl.sh: SSL Stress Test - server fips/client normal - with ECC ===============================
ssl.sh: Stress SSL3 RC4 128 with MD5 ----
selfserv starting at Thu Jun 1 00:14:30 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:14:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3664 >/dev/null 2>/dev/null
selfserv with PID 3664 found at Thu Jun 1 00:14:30 UTC 2017
selfserv with PID 3664 started at Thu Jun 1 00:14:30 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -c 1000 -C c -V ssl3:ssl3 \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:14:30 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Thu Jun 1 00:14:33 UTC 2017
ssl.sh: #2876: Stress SSL3 RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 3664 at Thu Jun 1 00:14:33 UTC 2017
kill -USR1 3664
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3664 killed at Thu Jun 1 00:14:33 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 ----
selfserv starting at Thu Jun 1 00:14:33 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:14:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3738 >/dev/null 2>/dev/null
selfserv with PID 3738 found at Thu Jun 1 00:14:33 UTC 2017
selfserv with PID 3738 started at Thu Jun 1 00:14:33 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -c 1000 -C c \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:14:33 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Thu Jun 1 00:14:36 UTC 2017
ssl.sh: #2877: Stress TLS RC4 128 with MD5 produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 3738 at Thu Jun 1 00:14:36 UTC 2017
kill -USR1 3738
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3738 killed at Thu Jun 1 00:14:36 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (false start) ----
selfserv starting at Thu Jun 1 00:14:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:14:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3812 >/dev/null 2>/dev/null
selfserv with PID 3812 found at Thu Jun 1 00:14:36 UTC 2017
selfserv with PID 3812 started at Thu Jun 1 00:14:36 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -c 1000 -C c -g \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:14:36 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Thu Jun 1 00:14:39 UTC 2017
ssl.sh: #2878: Stress TLS RC4 128 with MD5 (false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 3812 at Thu Jun 1 00:14:39 UTC 2017
kill -USR1 3812
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3812 killed at Thu Jun 1 00:14:39 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket) ----
selfserv starting at Thu Jun 1 00:14:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:14:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3886 >/dev/null 2>/dev/null
selfserv with PID 3886 found at Thu Jun 1 00:14:39 UTC 2017
selfserv with PID 3886 started at Thu Jun 1 00:14:39 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C c -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:14:39 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Thu Jun 1 00:14:42 UTC 2017
ssl.sh: #2879: Stress TLS RC4 128 with MD5 (session ticket) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 3886 at Thu Jun 1 00:14:42 UTC 2017
kill -USR1 3886
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3886 killed at Thu Jun 1 00:14:42 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression) ----
selfserv starting at Thu Jun 1 00:14:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:14:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 3960 >/dev/null 2>/dev/null
selfserv with PID 3960 found at Thu Jun 1 00:14:42 UTC 2017
selfserv with PID 3960 started at Thu Jun 1 00:14:42 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C c -z \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:14:42 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Thu Jun 1 00:14:45 UTC 2017
ssl.sh: #2880: Stress TLS RC4 128 with MD5 (compression) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 3960 at Thu Jun 1 00:14:46 UTC 2017
kill -USR1 3960
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 3960 killed at Thu Jun 1 00:14:46 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression) ----
selfserv starting at Thu Jun 1 00:14:46 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:14:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4034 >/dev/null 2>/dev/null
selfserv with PID 4034 found at Thu Jun 1 00:14:46 UTC 2017
selfserv with PID 4034 started at Thu Jun 1 00:14:46 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:14:46 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Thu Jun 1 00:14:49 UTC 2017
ssl.sh: #2881: Stress TLS RC4 128 with MD5 (session ticket, compression) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 4034 at Thu Jun 1 00:14:49 UTC 2017
kill -USR1 4034
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4034 killed at Thu Jun 1 00:14:49 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) ----
selfserv starting at Thu Jun 1 00:14:49 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:14:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4108 >/dev/null 2>/dev/null
selfserv with PID 4108 found at Thu Jun 1 00:14:49 UTC 2017
selfserv with PID 4108 started at Thu Jun 1 00:14:49 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C c -u -z -g \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:14:49 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Thu Jun 1 00:14:52 UTC 2017
ssl.sh: #2882: Stress TLS RC4 128 with MD5 (session ticket, compression, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 4108 at Thu Jun 1 00:14:52 UTC 2017
kill -USR1 4108
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4108 killed at Thu Jun 1 00:14:52 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI) ----
selfserv starting at Thu Jun 1 00:14:52 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -u -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:14:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4188 >/dev/null 2>/dev/null
selfserv with PID 4188 found at Thu Jun 1 00:14:53 UTC 2017
selfserv with PID 4188 started at Thu Jun 1 00:14:53 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V tls1.0:tls1.2 -c 1000 -C c -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:14:53 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Thu Jun 1 00:14:55 UTC 2017
ssl.sh: #2883: Stress TLS RC4 128 with MD5 (session ticket, SNI) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 4188 at Thu Jun 1 00:14:55 UTC 2017
kill -USR1 4188
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4188 killed at Thu Jun 1 00:14:55 UTC 2017
ssl.sh: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Thu Jun 1 00:14:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:14:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4277 >/dev/null 2>/dev/null
selfserv with PID 4277 found at Thu Jun 1 00:14:56 UTC 2017
selfserv with PID 4277 started at Thu Jun 1 00:14:56 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -c 100 -C c -V ssl3:ssl3 -N -n TestUser \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:14:56 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Jun 1 00:15:01 UTC 2017
ssl.sh: #2884: Stress SSL3 RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 4277 at Thu Jun 1 00:15:01 UTC 2017
kill -USR1 4277
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4277 killed at Thu Jun 1 00:15:01 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (no reuse, client auth) ----
selfserv starting at Thu Jun 1 00:15:01 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:15:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4355 >/dev/null 2>/dev/null
selfserv with PID 4355 found at Thu Jun 1 00:15:01 UTC 2017
selfserv with PID 4355 started at Thu Jun 1 00:15:01 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -c 100 -C c -N -n TestUser \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:15:01 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Jun 1 00:15:07 UTC 2017
ssl.sh: #2885: Stress TLS RC4 128 with MD5 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 4355 at Thu Jun 1 00:15:07 UTC 2017
kill -USR1 4355
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4355 killed at Thu Jun 1 00:15:07 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, client auth) ----
selfserv starting at Thu Jun 1 00:15:07 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:15:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4507 >/dev/null 2>/dev/null
selfserv with PID 4507 found at Thu Jun 1 00:15:07 UTC 2017
selfserv with PID 4507 started at Thu Jun 1 00:15:07 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:15:07 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Thu Jun 1 00:15:09 UTC 2017
ssl.sh: #2886: Stress TLS RC4 128 with MD5 (session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 4507 at Thu Jun 1 00:15:09 UTC 2017
kill -USR1 4507
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4507 killed at Thu Jun 1 00:15:09 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth) ----
selfserv starting at Thu Jun 1 00:15:09 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:15:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4617 >/dev/null 2>/dev/null
selfserv with PID 4617 found at Thu Jun 1 00:15:09 UTC 2017
selfserv with PID 4617 started at Thu Jun 1 00:15:09 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -z \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:15:09 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Thu Jun 1 00:15:11 UTC 2017
ssl.sh: #2887: Stress TLS RC4 128 with MD5 (compression, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 4617 at Thu Jun 1 00:15:11 UTC 2017
kill -USR1 4617
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4617 killed at Thu Jun 1 00:15:11 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (compression, client auth, false start) ----
selfserv starting at Thu Jun 1 00:15:11 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:15:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4789 >/dev/null 2>/dev/null
selfserv with PID 4789 found at Thu Jun 1 00:15:11 UTC 2017
selfserv with PID 4789 started at Thu Jun 1 00:15:11 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -z -g \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:15:11 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Thu Jun 1 00:15:13 UTC 2017
ssl.sh: #2888: Stress TLS RC4 128 with MD5 (compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 4789 at Thu Jun 1 00:15:13 UTC 2017
kill -USR1 4789
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4789 killed at Thu Jun 1 00:15:13 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) ----
selfserv starting at Thu Jun 1 00:15:13 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:15:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4890 >/dev/null 2>/dev/null
selfserv with PID 4890 found at Thu Jun 1 00:15:13 UTC 2017
selfserv with PID 4890 started at Thu Jun 1 00:15:13 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u -z \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:15:13 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Thu Jun 1 00:15:15 UTC 2017
ssl.sh: #2889: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 4890 at Thu Jun 1 00:15:15 UTC 2017
kill -USR1 4890
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4890 killed at Thu Jun 1 00:15:15 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) ----
selfserv starting at Thu Jun 1 00:15:15 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -z -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:15:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 4989 >/dev/null 2>/dev/null
selfserv with PID 4989 found at Thu Jun 1 00:15:15 UTC 2017
selfserv with PID 4989 started at Thu Jun 1 00:15:15 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C c -n TestUser -u -z -g \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:15:15 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Thu Jun 1 00:15:17 UTC 2017
ssl.sh: #2890: Stress TLS RC4 128 with MD5 (session ticket, compression, client auth, false start) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 4989 at Thu Jun 1 00:15:17 UTC 2017
kill -USR1 4989
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 4989 killed at Thu Jun 1 00:15:17 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) ----
selfserv starting at Thu Jun 1 00:15:17 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -a testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:15:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5104 >/dev/null 2>/dev/null
selfserv with PID 5104 found at Thu Jun 1 00:15:17 UTC 2017
selfserv with PID 5104 started at Thu Jun 1 00:15:17 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V tls1.0:tls1.2 -c 1000 -C c -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:15:17 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Thu Jun 1 00:15:21 UTC 2017
ssl.sh: #2891: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, default virt host) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5104 at Thu Jun 1 00:15:21 UTC 2017
kill -USR1 5104
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5104 killed at Thu Jun 1 00:15:21 UTC 2017
ssl.sh: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) ----
selfserv starting at Thu Jun 1 00:15:21 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -u -a testwandboard-sni.(none) -k testwandboard-sni.(none) -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:15:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5242 >/dev/null 2>/dev/null
selfserv with PID 5242 found at Thu Jun 1 00:15:21 UTC 2017
selfserv with PID 5242 started at Thu Jun 1 00:15:21 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V tls1.0:tls1.2 -c 1000 -C c -u -a testwandboard-sni.(none) \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:15:21 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Thu Jun 1 00:15:24 UTC 2017
ssl.sh: #2892: Stress TLS RC4 128 with MD5 (session ticket, SNI, client auth, change virt host) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5242 at Thu Jun 1 00:15:24 UTC 2017
kill -USR1 5242
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5242 killed at Thu Jun 1 00:15:24 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Thu Jun 1 00:15:25 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:15:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5331 >/dev/null 2>/dev/null
selfserv with PID 5331 found at Thu Jun 1 00:15:25 UTC 2017
selfserv with PID 5331 started at Thu Jun 1 00:15:25 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C009 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:15:25 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Jun 1 00:15:33 UTC 2017
ssl.sh: #2893: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5331 at Thu Jun 1 00:15:33 UTC 2017
kill -USR1 5331
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5331 killed at Thu Jun 1 00:15:33 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) ----
selfserv starting at Thu Jun 1 00:15:33 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C023 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:15:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5404 >/dev/null 2>/dev/null
selfserv with PID 5404 found at Thu Jun 1 00:15:33 UTC 2017
selfserv with PID 5404 started at Thu Jun 1 00:15:33 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C023 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:15:34 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Jun 1 00:15:42 UTC 2017
ssl.sh: #2894: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5404 at Thu Jun 1 00:15:42 UTC 2017
kill -USR1 5404
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5404 killed at Thu Jun 1 00:15:42 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) ----
selfserv starting at Thu Jun 1 00:15:42 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02B -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:15:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5477 >/dev/null 2>/dev/null
selfserv with PID 5477 found at Thu Jun 1 00:15:42 UTC 2017
selfserv with PID 5477 started at Thu Jun 1 00:15:42 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C02B -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:15:42 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Jun 1 00:15:50 UTC 2017
ssl.sh: #2895: Stress TLS ECDHE-ECDSA AES 128 GCM (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5477 at Thu Jun 1 00:15:50 UTC 2017
kill -USR1 5477
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5477 killed at Thu Jun 1 00:15:50 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Thu Jun 1 00:15:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:15:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5552 >/dev/null 2>/dev/null
selfserv with PID 5552 found at Thu Jun 1 00:15:50 UTC 2017
selfserv with PID 5552 started at Thu Jun 1 00:15:50 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C004 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:15:50 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Jun 1 00:16:00 UTC 2017
ssl.sh: #2896: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5552 at Thu Jun 1 00:16:00 UTC 2017
kill -USR1 5552
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5552 killed at Thu Jun 1 00:16:00 UTC 2017
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) ----
selfserv starting at Thu Jun 1 00:16:01 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C00E -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:16:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5626 >/dev/null 2>/dev/null
selfserv with PID 5626 found at Thu Jun 1 00:16:01 UTC 2017
selfserv with PID 5626 started at Thu Jun 1 00:16:01 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C00E -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:16:01 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Jun 1 00:16:08 UTC 2017
ssl.sh: #2897: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5626 at Thu Jun 1 00:16:08 UTC 2017
kill -USR1 5626
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5626 killed at Thu Jun 1 00:16:08 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA ----
selfserv starting at Thu Jun 1 00:16:08 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C013 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:16:08 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5699 >/dev/null 2>/dev/null
selfserv with PID 5699 found at Thu Jun 1 00:16:08 UTC 2017
selfserv with PID 5699 started at Thu Jun 1 00:16:08 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :C013 \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:16:08 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Thu Jun 1 00:16:11 UTC 2017
ssl.sh: #2898: Stress TLS ECDHE-RSA AES 128 CBC with SHA produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5699 at Thu Jun 1 00:16:11 UTC 2017
kill -USR1 5699
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5699 killed at Thu Jun 1 00:16:11 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 ----
selfserv starting at Thu Jun 1 00:16:11 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C027 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:16:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5773 >/dev/null 2>/dev/null
selfserv with PID 5773 found at Thu Jun 1 00:16:11 UTC 2017
selfserv with PID 5773 started at Thu Jun 1 00:16:11 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :C027 \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:16:11 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Thu Jun 1 00:16:14 UTC 2017
ssl.sh: #2899: Stress TLS ECDHE-RSA AES 128 CBC with SHA256 produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5773 at Thu Jun 1 00:16:14 UTC 2017
kill -USR1 5773
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5773 killed at Thu Jun 1 00:16:14 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 GCM ----
selfserv starting at Thu Jun 1 00:16:14 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C02F -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:16:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5847 >/dev/null 2>/dev/null
selfserv with PID 5847 found at Thu Jun 1 00:16:15 UTC 2017
selfserv with PID 5847 started at Thu Jun 1 00:16:15 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :C02F \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:16:15 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Thu Jun 1 00:16:17 UTC 2017
ssl.sh: #2900: Stress TLS ECDHE-RSA AES 128 GCM produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5847 at Thu Jun 1 00:16:17 UTC 2017
kill -USR1 5847
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5847 killed at Thu Jun 1 00:16:18 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) ----
selfserv starting at Thu Jun 1 00:16:18 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C004 -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:16:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5921 >/dev/null 2>/dev/null
selfserv with PID 5921 found at Thu Jun 1 00:16:18 UTC 2017
selfserv with PID 5921 started at Thu Jun 1 00:16:18 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :C004 -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:16:18 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes
strsclnt completed at Thu Jun 1 00:16:21 UTC 2017
ssl.sh: #2901: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5921 at Thu Jun 1 00:16:21 UTC 2017
kill -USR1 5921
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
999 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5921 killed at Thu Jun 1 00:16:21 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) ----
selfserv starting at Thu Jun 1 00:16:21 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C009 -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:16:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 5995 >/dev/null 2>/dev/null
selfserv with PID 5995 found at Thu Jun 1 00:16:21 UTC 2017
selfserv with PID 5995 started at Thu Jun 1 00:16:21 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C009 -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:16:21 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Thu Jun 1 00:16:23 UTC 2017
ssl.sh: #2902: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (session ticket) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 5995 at Thu Jun 1 00:16:23 UTC 2017
kill -USR1 5995
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 5995 killed at Thu Jun 1 00:16:23 UTC 2017
ssl.sh: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Thu Jun 1 00:16:23 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C009 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:16:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6084 >/dev/null 2>/dev/null
selfserv with PID 6084 found at Thu Jun 1 00:16:23 UTC 2017
selfserv with PID 6084 started at Thu Jun 1 00:16:23 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 10 -C :C009 -N -n TestUser-ec \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:16:23 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Thu Jun 1 00:16:26 UTC 2017
ssl.sh: #2903: Stress TLS ECDHE-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 6084 at Thu Jun 1 00:16:26 UTC 2017
kill -USR1 6084
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6084 killed at Thu Jun 1 00:16:26 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) ----
selfserv starting at Thu Jun 1 00:16:26 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:16:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6157 >/dev/null 2>/dev/null
selfserv with PID 6157 found at Thu Jun 1 00:16:26 UTC 2017
selfserv with PID 6157 started at Thu Jun 1 00:16:27 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:16:27 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Thu Jun 1 00:16:28 UTC 2017
ssl.sh: #2904: Stress TLS ECDHE-RSA AES 128 CBC with SHA (client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 6157 at Thu Jun 1 00:16:28 UTC 2017
kill -USR1 6157
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6157 killed at Thu Jun 1 00:16:28 UTC 2017
ssl.sh: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Thu Jun 1 00:16:29 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C004 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:16:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6231 >/dev/null 2>/dev/null
selfserv with PID 6231 found at Thu Jun 1 00:16:29 UTC 2017
selfserv with PID 6231 started at Thu Jun 1 00:16:29 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 10 -C :C004 -N -n TestUser-ec \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:16:29 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Thu Jun 1 00:16:32 UTC 2017
ssl.sh: #2905: Stress TLS ECDH-ECDSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 6231 at Thu Jun 1 00:16:32 UTC 2017
kill -USR1 6231
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6231 killed at Thu Jun 1 00:16:32 UTC 2017
ssl.sh: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) ----
selfserv starting at Thu Jun 1 00:16:32 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -r -r -c :C00E -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:16:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6304 >/dev/null 2>/dev/null
selfserv with PID 6304 found at Thu Jun 1 00:16:32 UTC 2017
selfserv with PID 6304 started at Thu Jun 1 00:16:32 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 10 -C :C00E -N -n TestUser-ecmixed \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:16:32 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 10 server certificates tested.
strsclnt completed at Thu Jun 1 00:16:34 UTC 2017
ssl.sh: #2906: Stress TLS ECDH-RSA AES 128 CBC with SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 6304 at Thu Jun 1 00:16:34 UTC 2017
kill -USR1 6304
selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6304 killed at Thu Jun 1 00:16:34 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) ----
selfserv starting at Thu Jun 1 00:16:35 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:16:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6377 >/dev/null 2>/dev/null
selfserv with PID 6377 found at Thu Jun 1 00:16:35 UTC 2017
selfserv with PID 6377 started at Thu Jun 1 00:16:35 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:16:35 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Thu Jun 1 00:16:36 UTC 2017
ssl.sh: #2907: Stress TLS ECDHE-RSA AES 128 CBC with SHA(client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 6377 at Thu Jun 1 00:16:36 UTC 2017
kill -USR1 6377
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6377 killed at Thu Jun 1 00:16:36 UTC 2017
ssl.sh: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) ----
selfserv starting at Thu Jun 1 00:16:37 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :C013 -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:16:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6451 >/dev/null 2>/dev/null
selfserv with PID 6451 found at Thu Jun 1 00:16:37 UTC 2017
selfserv with PID 6451 started at Thu Jun 1 00:16:37 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :C013 -n TestUser-ec -u \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:16:37 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes
strsclnt completed at Thu Jun 1 00:16:38 UTC 2017
ssl.sh: #2908: Stress TLS ECDHE-RSA AES 128 CBC with SHA(session ticket, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 6451 at Thu Jun 1 00:16:38 UTC 2017
kill -USR1 6451
selfserv: 99 cache hits; 1 cache misses, 0 cache not reusable
99 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6451 killed at Thu Jun 1 00:16:39 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) ----
selfserv starting at Thu Jun 1 00:16:39 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0016 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:16:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6540 >/dev/null 2>/dev/null
selfserv with PID 6540 found at Thu Jun 1 00:16:39 UTC 2017
selfserv with PID 6540 started at Thu Jun 1 00:16:39 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :0016 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:16:39 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Jun 1 00:16:45 UTC 2017
ssl.sh: #2909: Stress TLS DHE_RSA_WITH_3DES_EDE_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 6540 at Thu Jun 1 00:16:45 UTC 2017
kill -USR1 6540
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6540 killed at Thu Jun 1 00:16:45 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA ----
selfserv starting at Thu Jun 1 00:16:45 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0033 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:16:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6613 >/dev/null 2>/dev/null
selfserv with PID 6613 found at Thu Jun 1 00:16:45 UTC 2017
selfserv with PID 6613 started at Thu Jun 1 00:16:45 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :0033 \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:16:45 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Thu Jun 1 00:16:48 UTC 2017
ssl.sh: #2910: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 6613 at Thu Jun 1 00:16:48 UTC 2017
kill -USR1 6613
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6613 killed at Thu Jun 1 00:16:48 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Thu Jun 1 00:16:49 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0039 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:16:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6687 >/dev/null 2>/dev/null
selfserv with PID 6687 found at Thu Jun 1 00:16:49 UTC 2017
selfserv with PID 6687 started at Thu Jun 1 00:16:49 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :0039 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:16:49 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Jun 1 00:16:55 UTC 2017
ssl.sh: #2911: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 6687 at Thu Jun 1 00:16:55 UTC 2017
kill -USR1 6687
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6687 killed at Thu Jun 1 00:16:55 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) ----
selfserv starting at Thu Jun 1 00:16:55 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0040 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:16:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6760 >/dev/null 2>/dev/null
selfserv with PID 6760 found at Thu Jun 1 00:16:55 UTC 2017
selfserv with PID 6760 started at Thu Jun 1 00:16:55 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :0040 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:16:55 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Jun 1 00:17:03 UTC 2017
ssl.sh: #2912: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 6760 at Thu Jun 1 00:17:03 UTC 2017
kill -USR1 6760
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6760 killed at Thu Jun 1 00:17:03 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) ----
selfserv starting at Thu Jun 1 00:17:03 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :0038 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:17:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 6846 >/dev/null 2>/dev/null
selfserv with PID 6846 found at Thu Jun 1 00:17:03 UTC 2017
selfserv with PID 6846 started at Thu Jun 1 00:17:03 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :0038 -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:17:03 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Jun 1 00:18:10 UTC 2017
ssl.sh: #2913: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 6846 at Thu Jun 1 00:18:10 UTC 2017
kill -USR1 6846
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 6846 killed at Thu Jun 1 00:18:10 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse ----
selfserv starting at Thu Jun 1 00:18:10 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006A -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:18:10 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7233 >/dev/null 2>/dev/null
selfserv with PID 7233 found at Thu Jun 1 00:18:10 UTC 2017
selfserv with PID 7233 started at Thu Jun 1 00:18:10 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :006A -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:18:10 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Jun 1 00:19:15 UTC 2017
ssl.sh: #2914: Stress TLS DHE_DSS_WITH_AES_256_CBC_SHA256 (no reuse produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 7233 at Thu Jun 1 00:19:16 UTC 2017
kill -USR1 7233
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7233 killed at Thu Jun 1 00:19:16 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) ----
selfserv starting at Thu Jun 1 00:19:16 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :006B -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:19:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7310 >/dev/null 2>/dev/null
selfserv with PID 7310 found at Thu Jun 1 00:19:16 UTC 2017
selfserv with PID 7310 started at Thu Jun 1 00:19:16 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :006B -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:19:16 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 4 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Jun 1 00:19:22 UTC 2017
ssl.sh: #2915: Stress TLS DHE_RSA_WITH_AES_256_CBC_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 7310 at Thu Jun 1 00:19:22 UTC 2017
kill -USR1 7310
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7310 killed at Thu Jun 1 00:19:22 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) ----
selfserv starting at Thu Jun 1 00:19:22 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009E -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:19:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7383 >/dev/null 2>/dev/null
selfserv with PID 7383 found at Thu Jun 1 00:19:23 UTC 2017
selfserv with PID 7383 started at Thu Jun 1 00:19:23 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :009E -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:19:23 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Jun 1 00:19:29 UTC 2017
ssl.sh: #2916: Stress TLS DHE_RSA_WITH_AES_128_GCM_SHA256 (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 7383 at Thu Jun 1 00:19:29 UTC 2017
kill -USR1 7383
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7383 killed at Thu Jun 1 00:19:29 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) ----
selfserv starting at Thu Jun 1 00:19:29 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :009F -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:19:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7456 >/dev/null 2>/dev/null
selfserv with PID 7456 found at Thu Jun 1 00:19:29 UTC 2017
selfserv with PID 7456 started at Thu Jun 1 00:19:29 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :009F -N \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:19:29 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Jun 1 00:19:36 UTC 2017
ssl.sh: #2917: Stress TLS DHE_RSA_WITH_AES_256_GCM_SHA384 (no reuse) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 7456 at Thu Jun 1 00:19:36 UTC 2017
kill -USR1 7456
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7456 killed at Thu Jun 1 00:19:36 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) ----
selfserv starting at Thu Jun 1 00:19:36 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0032 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:19:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7544 >/dev/null 2>/dev/null
selfserv with PID 7544 found at Thu Jun 1 00:19:36 UTC 2017
selfserv with PID 7544 started at Thu Jun 1 00:19:36 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 100 -C :0032 -N -n TestUser-dsa \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:19:36 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 100 server certificates tested.
strsclnt completed at Thu Jun 1 00:19:47 UTC 2017
ssl.sh: #2918: Stress TLS DHE_DSS_WITH_AES_128_CBC_SHA (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 7544 at Thu Jun 1 00:19:47 UTC 2017
kill -USR1 7544
selfserv: 0 cache hits; 100 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7544 killed at Thu Jun 1 00:19:47 UTC 2017
ssl.sh: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) ----
selfserv starting at Thu Jun 1 00:19:47 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :0067 -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:19:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7617 >/dev/null 2>/dev/null
selfserv with PID 7617 found at Thu Jun 1 00:19:47 UTC 2017
selfserv with PID 7617 started at Thu Jun 1 00:19:47 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :0067 -n TestUser-dsamixed \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:19:47 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt completed at Thu Jun 1 00:19:50 UTC 2017
ssl.sh: #2919: Stress TLS DHE_RSA_WITH_AES_128_CBC_SHA256 (client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 7617 at Thu Jun 1 00:19:50 UTC 2017
kill -USR1 7617
selfserv: 999 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7617 killed at Thu Jun 1 00:19:50 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) ----
selfserv starting at Thu Jun 1 00:19:50 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A2 -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:19:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 7706 >/dev/null 2>/dev/null
selfserv with PID 7706 found at Thu Jun 1 00:19:51 UTC 2017
selfserv with PID 7706 started at Thu Jun 1 00:19:51 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :00A2 -N -n TestUser-dsa \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:19:51 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Jun 1 00:21:32 UTC 2017
ssl.sh: #2920: Stress TLS DHE_DSS_WITH_AES_128_GCM_SHA256 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 7706 at Thu Jun 1 00:21:33 UTC 2017
kill -USR1 7706
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 7706 killed at Thu Jun 1 00:21:33 UTC 2017
ssl.sh: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) ----
selfserv starting at Thu Jun 1 00:21:33 UTC 2017
selfserv -D -p 8443 -d ../server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -c :00A3 -u -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:21:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8168 >/dev/null 2>/dev/null
selfserv with PID 8168 found at Thu Jun 1 00:21:33 UTC 2017
selfserv with PID 8168 started at Thu Jun 1 00:21:33 UTC 2017
strsclnt -q -p 8443 -d ../client -w nss -V ssl3:tls1.2 -c 1000 -C :00A3 -N -n TestUser-dsa \
-V ssl3:tls1.2 127.0.0.1
strsclnt started at Thu Jun 1 00:21:33 UTC 2017
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: -- SSL: Server Certificate Validated.
strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes
strsclnt: NoReuse - 1000 server certificates tested.
strsclnt completed at Thu Jun 1 00:23:11 UTC 2017
ssl.sh: #2921: Stress TLS DHE_DSS_WITH_AES_256_GCM_SHA384 (no reuse, client auth) produced a returncode of 0, expected is 0. - PASSED
trying to kill selfserv with PID 8168 at Thu Jun 1 00:23:11 UTC 2017
kill -USR1 8168
selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8168 killed at Thu Jun 1 00:23:11 UTC 2017
ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal - with ECC ===============================
selfserv starting at Thu Jun 1 00:23:11 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:23:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:11 UTC 2017
selfserv with PID 8519 started at Thu Jun 1 00:23:11 UTC 2017
ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:12 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2922: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2923: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2924: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2925: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2926: SSL3_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2927: SSL3_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping SSL3_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only)
ssl.sh: skipping SSL3_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only)
ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2928: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:14 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2929: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2930: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running SSL3_RSA_WITH_NULL_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:ssl3 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2931: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009F -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2932: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A3 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2933: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009D -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2934: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2935: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2936: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2937: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_NULL_MD5 ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:17 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2938: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2939: TLS_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2940: TLS_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping TLS_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only)
ssl.sh: skipping TLS_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only)
ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2941: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2942: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2943: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_RSA_WITH_NULL_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2944: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:19 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2945: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2946: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2947: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping f TLS11_RSA_EXPORT_WITH_RC4_40_MD5 (non-FIPS only)
ssl.sh: skipping g TLS11_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2948: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2949: TLS11_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2950: TLS11_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping TLS11_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only)
ssl.sh: skipping TLS11_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only)
ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2951: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2952: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:21 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2953: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_RSA_WITH_NULL_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2954: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c c -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2955: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c d -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2956: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c e -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2957: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c i -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2958: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c j -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2959: TLS12_RSA_FIPS_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_FIPS_WITH_DES_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c k -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2960: TLS12_RSA_FIPS_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: skipping l TLS12_RSA_EXPORT_WITH_DES_CBC_SHA (new) (non-FIPS only)
ssl.sh: skipping m TLS12_RSA_EXPORT_WITH_RC4_56_SHA (new) (non-FIPS only)
ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c n -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2961: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c v -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2962: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:24 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c y -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2963: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c z -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2964: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0016 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2965: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0032 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2966: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0033 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2967: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:26 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0038 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2968: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0039 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2969: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003B -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2970: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003C -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2971: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :003D -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2972: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0040 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2973: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:28 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :0067 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2974: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006A -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2975: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :006B -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2976: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009C -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2977: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :009E -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2978: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:30 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :00A2 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-dsa@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2979: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCAA -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2980: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2981: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2982: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2983: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:32 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2984: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2985: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2986: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2987: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:34 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2988: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2989: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 8519 >/dev/null 2>/dev/null
selfserv with PID 8519 found at Thu Jun 1 00:23:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2990: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 8519 at Thu Jun 1 00:23:36 UTC 2017
kill -USR1 8519
selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 8519 killed at Thu Jun 1 00:23:36 UTC 2017
ssl.sh: TLS_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Jun 1 00:23:36 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:23:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10177 >/dev/null 2>/dev/null
selfserv with PID 10177 found at Thu Jun 1 00:23:36 UTC 2017
selfserv with PID 10177 started at Thu Jun 1 00:23:36 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2991: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 10177 >/dev/null 2>/dev/null
selfserv with PID 10177 found at Thu Jun 1 00:23:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2992: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 10177 >/dev/null 2>/dev/null
selfserv with PID 10177 found at Thu Jun 1 00:23:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2993: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 10177 >/dev/null 2>/dev/null
selfserv with PID 10177 found at Thu Jun 1 00:23:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2994: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 10177 >/dev/null 2>/dev/null
selfserv with PID 10177 found at Thu Jun 1 00:23:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2995: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 10177 at Thu Jun 1 00:23:38 UTC 2017
kill -USR1 10177
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10177 killed at Thu Jun 1 00:23:38 UTC 2017
ssl.sh: TLS_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Jun 1 00:23:38 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:23:38 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10316 >/dev/null 2>/dev/null
selfserv with PID 10316 found at Thu Jun 1 00:23:39 UTC 2017
selfserv with PID 10316 started at Thu Jun 1 00:23:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2996: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 10316 >/dev/null 2>/dev/null
selfserv with PID 10316 found at Thu Jun 1 00:23:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2997: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 10316 >/dev/null 2>/dev/null
selfserv with PID 10316 found at Thu Jun 1 00:23:40 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2998: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 10316 >/dev/null 2>/dev/null
selfserv with PID 10316 found at Thu Jun 1 00:23:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #2999: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 10316 >/dev/null 2>/dev/null
selfserv with PID 10316 found at Thu Jun 1 00:23:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.0 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3000: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 10316 >/dev/null 2>/dev/null
selfserv with PID 10316 found at Thu Jun 1 00:23:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3001: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 10316 >/dev/null 2>/dev/null
selfserv with PID 10316 found at Thu Jun 1 00:23:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3002: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 10316 >/dev/null 2>/dev/null
selfserv with PID 10316 found at Thu Jun 1 00:23:42 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3003: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 10316 >/dev/null 2>/dev/null
selfserv with PID 10316 found at Thu Jun 1 00:23:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3004: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 10316 >/dev/null 2>/dev/null
selfserv with PID 10316 found at Thu Jun 1 00:23:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3005: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 10316 >/dev/null 2>/dev/null
selfserv with PID 10316 found at Thu Jun 1 00:23:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3006: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 10316 >/dev/null 2>/dev/null
selfserv with PID 10316 found at Thu Jun 1 00:23:44 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3007: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 10316 >/dev/null 2>/dev/null
selfserv with PID 10316 found at Thu Jun 1 00:23:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3008: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 10316 >/dev/null 2>/dev/null
selfserv with PID 10316 found at Thu Jun 1 00:23:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3009: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 10316 >/dev/null 2>/dev/null
selfserv with PID 10316 found at Thu Jun 1 00:23:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3010: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 10316 at Thu Jun 1 00:23:46 UTC 2017
kill -USR1 10316
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10316 killed at Thu Jun 1 00:23:46 UTC 2017
ssl.sh: TLS11_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Jun 1 00:23:46 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:23:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10671 >/dev/null 2>/dev/null
selfserv with PID 10671 found at Thu Jun 1 00:23:46 UTC 2017
selfserv with PID 10671 started at Thu Jun 1 00:23:46 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3011: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 10671 >/dev/null 2>/dev/null
selfserv with PID 10671 found at Thu Jun 1 00:23:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3012: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 10671 >/dev/null 2>/dev/null
selfserv with PID 10671 found at Thu Jun 1 00:23:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3013: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 10671 >/dev/null 2>/dev/null
selfserv with PID 10671 found at Thu Jun 1 00:23:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3014: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 10671 >/dev/null 2>/dev/null
selfserv with PID 10671 found at Thu Jun 1 00:23:48 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3015: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 10671 at Thu Jun 1 00:23:49 UTC 2017
kill -USR1 10671
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10671 killed at Thu Jun 1 00:23:49 UTC 2017
ssl.sh: TLS11_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Jun 1 00:23:49 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:23:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 10809 >/dev/null 2>/dev/null
selfserv with PID 10809 found at Thu Jun 1 00:23:49 UTC 2017
selfserv with PID 10809 started at Thu Jun 1 00:23:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3016: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 10809 >/dev/null 2>/dev/null
selfserv with PID 10809 found at Thu Jun 1 00:23:50 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3017: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 10809 >/dev/null 2>/dev/null
selfserv with PID 10809 found at Thu Jun 1 00:23:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3018: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 10809 >/dev/null 2>/dev/null
selfserv with PID 10809 found at Thu Jun 1 00:23:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3019: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 10809 >/dev/null 2>/dev/null
selfserv with PID 10809 found at Thu Jun 1 00:23:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.1 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3020: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 10809 >/dev/null 2>/dev/null
selfserv with PID 10809 found at Thu Jun 1 00:23:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C001 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3021: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 10809 >/dev/null 2>/dev/null
selfserv with PID 10809 found at Thu Jun 1 00:23:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C002 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3022: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 10809 >/dev/null 2>/dev/null
selfserv with PID 10809 found at Thu Jun 1 00:23:52 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C003 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3023: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 10809 >/dev/null 2>/dev/null
selfserv with PID 10809 found at Thu Jun 1 00:23:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C004 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3024: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 10809 >/dev/null 2>/dev/null
selfserv with PID 10809 found at Thu Jun 1 00:23:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C005 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3025: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ----------------------------
kill -0 10809 >/dev/null 2>/dev/null
selfserv with PID 10809 found at Thu Jun 1 00:23:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C006 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3026: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ----------------------------
kill -0 10809 >/dev/null 2>/dev/null
selfserv with PID 10809 found at Thu Jun 1 00:23:54 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C007 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3027: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 10809 >/dev/null 2>/dev/null
selfserv with PID 10809 found at Thu Jun 1 00:23:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C008 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3028: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 10809 >/dev/null 2>/dev/null
selfserv with PID 10809 found at Thu Jun 1 00:23:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C009 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3029: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 10809 >/dev/null 2>/dev/null
selfserv with PID 10809 found at Thu Jun 1 00:23:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00A -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3030: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 10809 at Thu Jun 1 00:23:56 UTC 2017
kill -USR1 10809
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 10809 killed at Thu Jun 1 00:23:56 UTC 2017
ssl.sh: TLS12_ECDH_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Jun 1 00:23:56 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ecmixed -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:23:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11163 >/dev/null 2>/dev/null
selfserv with PID 11163 found at Thu Jun 1 00:23:56 UTC 2017
selfserv with PID 11163 started at Thu Jun 1 00:23:56 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00B -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3031: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 11163 >/dev/null 2>/dev/null
selfserv with PID 11163 found at Thu Jun 1 00:23:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00C -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3032: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11163 >/dev/null 2>/dev/null
selfserv with PID 11163 found at Thu Jun 1 00:23:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00D -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3033: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 11163 >/dev/null 2>/dev/null
selfserv with PID 11163 found at Thu Jun 1 00:23:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00E -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3034: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 11163 >/dev/null 2>/dev/null
selfserv with PID 11163 found at Thu Jun 1 00:23:58 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C00F -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ecmixed@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3035: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ----------------------------
trying to kill selfserv with PID 11163 at Thu Jun 1 00:23:58 UTC 2017
kill -USR1 11163
selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11163 killed at Thu Jun 1 00:23:59 UTC 2017
ssl.sh: TLS12_ECDHE_RSA_WITH_NULL_SHA ----
selfserv starting at Thu Jun 1 00:23:59 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdefgijklmnvyz -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:23:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11301 >/dev/null 2>/dev/null
selfserv with PID 11301 found at Thu Jun 1 00:23:59 UTC 2017
selfserv with PID 11301 started at Thu Jun 1 00:23:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C010 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3036: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ----------------------------
kill -0 11301 >/dev/null 2>/dev/null
selfserv with PID 11301 found at Thu Jun 1 00:24:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C011 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3037: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ----------------------------
kill -0 11301 >/dev/null 2>/dev/null
selfserv with PID 11301 found at Thu Jun 1 00:24:00 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C012 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3038: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ----------------------------
kill -0 11301 >/dev/null 2>/dev/null
selfserv with PID 11301 found at Thu Jun 1 00:24:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C013 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3039: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ----------------------------
kill -0 11301 >/dev/null 2>/dev/null
selfserv with PID 11301 found at Thu Jun 1 00:24:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C014 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3040: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 11301 >/dev/null 2>/dev/null
selfserv with PID 11301 found at Thu Jun 1 00:24:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C023 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3041: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 11301 >/dev/null 2>/dev/null
selfserv with PID 11301 found at Thu Jun 1 00:24:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C024 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3042: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ----------------------------
kill -0 11301 >/dev/null 2>/dev/null
selfserv with PID 11301 found at Thu Jun 1 00:24:02 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C027 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3043: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ----------------------------
kill -0 11301 >/dev/null 2>/dev/null
selfserv with PID 11301 found at Thu Jun 1 00:24:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C028 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3044: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 11301 >/dev/null 2>/dev/null
selfserv with PID 11301 found at Thu Jun 1 00:24:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02B -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3045: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 11301 >/dev/null 2>/dev/null
selfserv with PID 11301 found at Thu Jun 1 00:24:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02C -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3046: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ----------------------------
kill -0 11301 >/dev/null 2>/dev/null
selfserv with PID 11301 found at Thu Jun 1 00:24:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C02F -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3047: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ----------------------------
kill -0 11301 >/dev/null 2>/dev/null
selfserv with PID 11301 found at Thu Jun 1 00:24:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :C030 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3048: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 11301 >/dev/null 2>/dev/null
selfserv with PID 11301 found at Thu Jun 1 00:24:04 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA8 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3049: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ----------------------------
kill -0 11301 >/dev/null 2>/dev/null
selfserv with PID 11301 found at Thu Jun 1 00:24:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -c :CCA9 -V ssl3:tls1.2 \
-f -d ../ext_client -v -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3050: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11301 at Thu Jun 1 00:24:05 UTC 2017
kill -USR1 11301
selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11301 killed at Thu Jun 1 00:24:05 UTC 2017
ssl.sh: SSL Client Authentication Extended Test - server fips/client normal - with ECC ===============================
ssl.sh: TLS Request don't require client auth (client does not provide auth) ----
selfserv starting at Thu Jun 1 00:24:06 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:24:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11702 >/dev/null 2>/dev/null
selfserv with PID 11702 found at Thu Jun 1 00:24:06 UTC 2017
selfserv with PID 11702 started at Thu Jun 1 00:24:06 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3051: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11702 at Thu Jun 1 00:24:07 UTC 2017
kill -USR1 11702
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11702 killed at Thu Jun 1 00:24:07 UTC 2017
ssl.sh: TLS Request don't require client auth (bad password) ----
selfserv starting at Thu Jun 1 00:24:07 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:24:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11759 >/dev/null 2>/dev/null
selfserv with PID 11759 found at Thu Jun 1 00:24:07 UTC 2017
selfserv with PID 11759 started at Thu Jun 1 00:24:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w bogus -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3052: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11759 at Thu Jun 1 00:24:09 UTC 2017
kill -USR1 11759
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11759 killed at Thu Jun 1 00:24:09 UTC 2017
ssl.sh: TLS Request don't require client auth (client auth) ----
selfserv starting at Thu Jun 1 00:24:09 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:24:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11816 >/dev/null 2>/dev/null
selfserv with PID 11816 found at Thu Jun 1 00:24:09 UTC 2017
selfserv with PID 11816 started at Thu Jun 1 00:24:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w nss -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3053: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11816 at Thu Jun 1 00:24:11 UTC 2017
kill -USR1 11816
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11816 killed at Thu Jun 1 00:24:11 UTC 2017
ssl.sh: TLS Require client auth (client does not provide auth) ----
selfserv starting at Thu Jun 1 00:24:11 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:24:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11873 >/dev/null 2>/dev/null
selfserv with PID 11873 found at Thu Jun 1 00:24:11 UTC 2017
selfserv with PID 11873 started at Thu Jun 1 00:24:11 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3054: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11873 at Thu Jun 1 00:24:12 UTC 2017
kill -USR1 11873
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11873 killed at Thu Jun 1 00:24:13 UTC 2017
ssl.sh: TLS Require client auth (bad password) ----
selfserv starting at Thu Jun 1 00:24:13 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:24:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11930 >/dev/null 2>/dev/null
selfserv with PID 11930 found at Thu Jun 1 00:24:13 UTC 2017
selfserv with PID 11930 started at Thu Jun 1 00:24:13 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w bogus -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3055: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 11930 at Thu Jun 1 00:24:14 UTC 2017
kill -USR1 11930
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11930 killed at Thu Jun 1 00:24:14 UTC 2017
ssl.sh: TLS Require client auth (client auth) ----
selfserv starting at Thu Jun 1 00:24:14 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:24:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 11987 >/dev/null 2>/dev/null
selfserv with PID 11987 found at Thu Jun 1 00:24:15 UTC 2017
selfserv with PID 11987 started at Thu Jun 1 00:24:15 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w nss -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3056: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 11987 at Thu Jun 1 00:24:16 UTC 2017
kill -USR1 11987
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 11987 killed at Thu Jun 1 00:24:16 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ----
selfserv starting at Thu Jun 1 00:24:16 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:24:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12044 >/dev/null 2>/dev/null
selfserv with PID 12044 found at Thu Jun 1 00:24:16 UTC 2017
selfserv with PID 12044 started at Thu Jun 1 00:24:16 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3057: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12044 at Thu Jun 1 00:24:18 UTC 2017
kill -USR1 12044
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12044 killed at Thu Jun 1 00:24:18 UTC 2017
ssl.sh: SSL3 Request don't require client auth (bad password) ----
selfserv starting at Thu Jun 1 00:24:18 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:24:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12101 >/dev/null 2>/dev/null
selfserv with PID 12101 found at Thu Jun 1 00:24:18 UTC 2017
selfserv with PID 12101 started at Thu Jun 1 00:24:18 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3058: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12101 at Thu Jun 1 00:24:20 UTC 2017
kill -USR1 12101
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12101 killed at Thu Jun 1 00:24:20 UTC 2017
ssl.sh: SSL3 Request don't require client auth (client auth) ----
selfserv starting at Thu Jun 1 00:24:20 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:24:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12158 >/dev/null 2>/dev/null
selfserv with PID 12158 found at Thu Jun 1 00:24:20 UTC 2017
selfserv with PID 12158 started at Thu Jun 1 00:24:20 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3059: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12158 at Thu Jun 1 00:24:21 UTC 2017
kill -USR1 12158
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12158 killed at Thu Jun 1 00:24:21 UTC 2017
ssl.sh: SSL3 Require client auth (client does not provide auth) ----
selfserv starting at Thu Jun 1 00:24:22 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:24:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12215 >/dev/null 2>/dev/null
selfserv with PID 12215 found at Thu Jun 1 00:24:22 UTC 2017
selfserv with PID 12215 started at Thu Jun 1 00:24:22 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3060: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12215 at Thu Jun 1 00:24:23 UTC 2017
kill -USR1 12215
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12215 killed at Thu Jun 1 00:24:23 UTC 2017
ssl.sh: SSL3 Require client auth (bad password) ----
selfserv starting at Thu Jun 1 00:24:23 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:24:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12272 >/dev/null 2>/dev/null
selfserv with PID 12272 found at Thu Jun 1 00:24:23 UTC 2017
selfserv with PID 12272 started at Thu Jun 1 00:24:23 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3061: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12272 at Thu Jun 1 00:24:25 UTC 2017
kill -USR1 12272
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12272 killed at Thu Jun 1 00:24:25 UTC 2017
ssl.sh: SSL3 Require client auth (client auth) ----
selfserv starting at Thu Jun 1 00:24:25 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:24:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12329 >/dev/null 2>/dev/null
selfserv with PID 12329 found at Thu Jun 1 00:24:25 UTC 2017
selfserv with PID 12329 started at Thu Jun 1 00:24:25 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3062: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12329 at Thu Jun 1 00:24:27 UTC 2017
kill -USR1 12329
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12329 killed at Thu Jun 1 00:24:27 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Jun 1 00:24:27 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:24:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12388 >/dev/null 2>/dev/null
selfserv with PID 12388 found at Thu Jun 1 00:24:27 UTC 2017
selfserv with PID 12388 started at Thu Jun 1 00:24:27 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3063: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12388 at Thu Jun 1 00:24:29 UTC 2017
kill -USR1 12388
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12388 killed at Thu Jun 1 00:24:29 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Jun 1 00:24:29 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:24:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12445 >/dev/null 2>/dev/null
selfserv with PID 12445 found at Thu Jun 1 00:24:29 UTC 2017
selfserv with PID 12445 started at Thu Jun 1 00:24:29 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w bogus -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3064: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12445 at Thu Jun 1 00:24:31 UTC 2017
kill -USR1 12445
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12445 killed at Thu Jun 1 00:24:31 UTC 2017
ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Jun 1 00:24:31 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:24:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12502 >/dev/null 2>/dev/null
selfserv with PID 12502 found at Thu Jun 1 00:24:31 UTC 2017
selfserv with PID 12502 started at Thu Jun 1 00:24:31 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w nss -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3065: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12502 at Thu Jun 1 00:24:33 UTC 2017
kill -USR1 12502
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12502 killed at Thu Jun 1 00:24:33 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Jun 1 00:24:33 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:24:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12559 >/dev/null 2>/dev/null
selfserv with PID 12559 found at Thu Jun 1 00:24:33 UTC 2017
selfserv with PID 12559 started at Thu Jun 1 00:24:33 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3066: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12559 at Thu Jun 1 00:24:35 UTC 2017
kill -USR1 12559
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12559 killed at Thu Jun 1 00:24:35 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Jun 1 00:24:35 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:24:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12616 >/dev/null 2>/dev/null
selfserv with PID 12616 found at Thu Jun 1 00:24:35 UTC 2017
selfserv with PID 12616 started at Thu Jun 1 00:24:35 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w bogus -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3067: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12616 at Thu Jun 1 00:24:37 UTC 2017
kill -USR1 12616
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12616 killed at Thu Jun 1 00:24:37 UTC 2017
ssl.sh: TLS Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Jun 1 00:24:37 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:24:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12673 >/dev/null 2>/dev/null
selfserv with PID 12673 found at Thu Jun 1 00:24:37 UTC 2017
selfserv with PID 12673 started at Thu Jun 1 00:24:37 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w nss -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3068: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12673 at Thu Jun 1 00:24:39 UTC 2017
kill -USR1 12673
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12673 killed at Thu Jun 1 00:24:39 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Jun 1 00:24:39 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:24:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12730 >/dev/null 2>/dev/null
selfserv with PID 12730 found at Thu Jun 1 00:24:39 UTC 2017
selfserv with PID 12730 started at Thu Jun 1 00:24:39 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.0 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3069: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12730 at Thu Jun 1 00:24:41 UTC 2017
kill -USR1 12730
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12730 killed at Thu Jun 1 00:24:41 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Jun 1 00:24:41 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:24:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12787 >/dev/null 2>/dev/null
selfserv with PID 12787 found at Thu Jun 1 00:24:41 UTC 2017
selfserv with PID 12787 started at Thu Jun 1 00:24:41 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3070: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12787 at Thu Jun 1 00:24:43 UTC 2017
kill -USR1 12787
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12787 killed at Thu Jun 1 00:24:43 UTC 2017
ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Jun 1 00:24:43 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:24:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12844 >/dev/null 2>/dev/null
selfserv with PID 12844 found at Thu Jun 1 00:24:43 UTC 2017
selfserv with PID 12844 started at Thu Jun 1 00:24:43 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3071: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 12844 at Thu Jun 1 00:24:45 UTC 2017
kill -USR1 12844
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12844 killed at Thu Jun 1 00:24:45 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Jun 1 00:24:45 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:24:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12901 >/dev/null 2>/dev/null
selfserv with PID 12901 found at Thu Jun 1 00:24:45 UTC 2017
selfserv with PID 12901 started at Thu Jun 1 00:24:45 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.0 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3072: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12901 at Thu Jun 1 00:24:47 UTC 2017
kill -USR1 12901
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12901 killed at Thu Jun 1 00:24:47 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Jun 1 00:24:47 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:24:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 12958 >/dev/null 2>/dev/null
selfserv with PID 12958 found at Thu Jun 1 00:24:47 UTC 2017
selfserv with PID 12958 started at Thu Jun 1 00:24:47 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.0 -w bogus -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3073: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 12958 at Thu Jun 1 00:24:49 UTC 2017
kill -USR1 12958
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 12958 killed at Thu Jun 1 00:24:49 UTC 2017
ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Jun 1 00:24:49 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:24:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13015 >/dev/null 2>/dev/null
selfserv with PID 13015 found at Thu Jun 1 00:24:49 UTC 2017
selfserv with PID 13015 started at Thu Jun 1 00:24:49 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.0 -w nss -n ExtendedSSLUser < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3074: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13015 at Thu Jun 1 00:24:51 UTC 2017
kill -USR1 13015
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13015 killed at Thu Jun 1 00:24:51 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Jun 1 00:24:51 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:24:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13072 >/dev/null 2>/dev/null
selfserv with PID 13072 found at Thu Jun 1 00:24:51 UTC 2017
selfserv with PID 13072 started at Thu Jun 1 00:24:51 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3075: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13072 at Thu Jun 1 00:24:53 UTC 2017
kill -USR1 13072
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13072 killed at Thu Jun 1 00:24:53 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Jun 1 00:24:53 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:24:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13129 >/dev/null 2>/dev/null
selfserv with PID 13129 found at Thu Jun 1 00:24:53 UTC 2017
selfserv with PID 13129 started at Thu Jun 1 00:24:53 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3076: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13129 at Thu Jun 1 00:24:55 UTC 2017
kill -USR1 13129
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13129 killed at Thu Jun 1 00:24:55 UTC 2017
ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Jun 1 00:24:55 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:24:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13186 >/dev/null 2>/dev/null
selfserv with PID 13186 found at Thu Jun 1 00:24:55 UTC 2017
selfserv with PID 13186 started at Thu Jun 1 00:24:55 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3077: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13186 at Thu Jun 1 00:24:57 UTC 2017
kill -USR1 13186
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13186 killed at Thu Jun 1 00:24:57 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ----
selfserv starting at Thu Jun 1 00:24:57 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:24:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13243 >/dev/null 2>/dev/null
selfserv with PID 13243 found at Thu Jun 1 00:24:57 UTC 2017
selfserv with PID 13243 started at Thu Jun 1 00:24:57 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -w nss -n none < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3078: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13243 at Thu Jun 1 00:24:59 UTC 2017
kill -USR1 13243
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13243 killed at Thu Jun 1 00:24:59 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ----
selfserv starting at Thu Jun 1 00:24:59 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:24:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13300 >/dev/null 2>/dev/null
selfserv with PID 13300 found at Thu Jun 1 00:24:59 UTC 2017
selfserv with PID 13300 started at Thu Jun 1 00:24:59 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser -w bogus < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: SSL_ForceHandshake returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 1
ssl.sh: #3079: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13300 at Thu Jun 1 00:25:00 UTC 2017
kill -USR1 13300
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13300 killed at Thu Jun 1 00:25:00 UTC 2017
ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ----
selfserv starting at Thu Jun 1 00:25:01 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:25:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13357 >/dev/null 2>/dev/null
selfserv with PID 13357 found at Thu Jun 1 00:25:01 UTC 2017
selfserv with PID 13357 started at Thu Jun 1 00:25:01 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:ssl3 -n ExtendedSSLUser -w nss < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server -1 bytes
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: using asynchronous certificate validation
tstclnt: Read from server -1 bytes
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC
tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: Read from server 1 bytes
H
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 136 bytes
TTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3080: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13357 at Thu Jun 1 00:25:02 UTC 2017
kill -USR1 13357
selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13357 killed at Thu Jun 1 00:25:02 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (bad password) ----
selfserv starting at Thu Jun 1 00:25:03 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:25:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13465 >/dev/null 2>/dev/null
selfserv with PID 13465 found at Thu Jun 1 00:25:03 UTC 2017
selfserv with PID 13465 started at Thu Jun 1 00:25:03 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3081: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13465 at Thu Jun 1 00:25:05 UTC 2017
kill -USR1 13465
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13465 killed at Thu Jun 1 00:25:05 UTC 2017
ssl.sh: TLS Request don't require client auth (EC) (client auth) ----
selfserv starting at Thu Jun 1 00:25:05 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:25:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13569 >/dev/null 2>/dev/null
selfserv with PID 13569 found at Thu Jun 1 00:25:05 UTC 2017
selfserv with PID 13569 started at Thu Jun 1 00:25:05 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Compression: NULL, Extended Master Secret: No
subject DN: CN=127.0.0.1,E=127.0.0.1-ec@bogus.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US
issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US
0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes
Received 0 Cert Status items (OCSP stapled data)
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 0 bytes
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 137 bytes
HTTP/1.0 200 OK
Server: Generic Web Server
Date: Tue, 26 Aug 1997 22:10:05 GMT
Content-type: text/plain
GET / HTTP/1.0
EOF
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: PR_Poll returned 0x01 for socket out_flags.
tstclnt: Read from server 0 bytes
tstclnt: exiting with return code 0
ssl.sh: #3082: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED
trying to kill selfserv with PID 13569 at Thu Jun 1 00:25:07 UTC 2017
kill -USR1 13569
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13569 killed at Thu Jun 1 00:25:07 UTC 2017
ssl.sh: TLS Require client auth (EC) (bad password) ----
selfserv starting at Thu Jun 1 00:25:07 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:25:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13657 >/dev/null 2>/dev/null
selfserv with PID 13657 found at Thu Jun 1 00:25:07 UTC 2017
selfserv with PID 13657 started at Thu Jun 1 00:25:07 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w bogus -n ExtendedSSLUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
selfserv: HDX PR_Read returned error -12285:
Unable to find the certificate or key necessary for authentication.
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
Incorrect password/PIN entered.
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate.
tstclnt: exiting with return code 254
ssl.sh: #3083: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED
trying to kill selfserv with PID 13657 at Thu Jun 1 00:25:09 UTC 2017
kill -USR1 13657
selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable
0 stateless resumes, 0 ticket parse failures
selfserv: normal termination
selfserv -b -p 8443 2>/dev/null;
selfserv with PID 13657 killed at Thu Jun 1 00:25:09 UTC 2017
ssl.sh: TLS Require client auth (EC) (client auth) ----
selfserv starting at Thu Jun 1 00:25:09 UTC 2017
selfserv -D -p 8443 -d ../ext_server -n 127.0.0.1 \
-e 127.0.0.1-ec -S 127.0.0.1-dsa -w nss -r -r -i ../tests_pid.23539\
-V ssl3:tls1.2 -H 1 &
trying to connect to selfserv at Thu Jun 1 00:25:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -q \
-d ../ext_client -v < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: exiting with return code 0
kill -0 13733 >/dev/null 2>/dev/null
selfserv with PID 13733 found at Thu Jun 1 00:25:09 UTC 2017
selfserv with PID 13733 started at Thu Jun 1 00:25:09 UTC 2017
tstclnt -p 8443 -h 127.0.0.1 -f -d ../ext_client -v \
-V ssl3:tls1.2 -w nss -n ExtendedSSLUser-ec < /<<PKGBUILDDIR>>/nss/tests/ssl/sslreq.dat
tstclnt: connecting to 127.0.0.1:8443 (address=127.0.0.1)
tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect)
tstclnt: about to call PR_Poll for connect completion!
tstclnt: PR_Poll returned 0x02 for socket out_flags.
tstclnt: ready...
tstclnt: about to call PR_Poll !
tstclnt: PR_Poll returned!
tstclnt: PR_Poll returned 0x01 for stdin out_flags.
tstclnt: PR_Poll returned 0x00 for socket out_flags.
tstclnt: stdin read 18 bytes
tstclnt: Writing 18 bytes to server
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: using asynchronous certificate validation
tstclnt: handshake was paused by auth certificate hook
tstclnt: about to call PR_Poll on writable socket !
tstclnt: PR_Poll returned with writable socket !
tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC
tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE
Comp